CVE-2025-2056

7.5 HIGH

📋 TL;DR

The WP Ghost (Hide My WP Ghost) plugin for WordPress has a path traversal vulnerability in the showFile function, allowing unauthenticated attackers to read specific file types on the server, potentially exposing sensitive information. This affects all versions up to and including 5.4.01, putting any WordPress site using this plugin at risk.

💻 Affected Systems

Products:
  • WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress
Versions: All versions up to and including 5.4.01
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability is present in the default configuration of the plugin; no special settings are required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files like configuration files, logs, or credentials, leading to data breaches, privilege escalation, or further attacks.

🟠

Likely Case

Attackers exploit this to read accessible files, such as wp-config.php, to steal database credentials or other sensitive data.

🟢

If Mitigated

With proper file permissions and network segmentation, impact is limited to non-critical files, but risk remains if sensitive data is exposed.

🌐 Internet-Facing: HIGH, as the vulnerability is exploitable by unauthenticated attackers over the internet, making exposed WordPress sites immediate targets.
🏢 Internal Only: MEDIUM, as internal attackers could still exploit it, but external exposure increases the overall threat level.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via crafted HTTP requests to the vulnerable function, requiring no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.02

Vendor Advisory: https://plugins.trac.wordpress.org/browser/hide-my-wp/tags/5.4.02/models/Files.php#L336

Restart Required: No

Instructions:

1. Log into the WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Hide My WP Ghost' and click 'Update Now' to version 5.4.02 or later. 4. Verify the update is successful.

🔧 Temporary Workarounds

Disable the plugin

WordPress

Temporarily deactivate the WP Ghost plugin to prevent exploitation until patching is possible.

wp plugin deactivate hide-my-wp-ghost

🧯 If You Can't Patch

  • Implement strict file permissions to limit access to sensitive files on the server.
  • Use a web application firewall (WAF) to block path traversal attempts and monitor for suspicious requests.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 5.4.01 or earlier, it is vulnerable.

Check Version:

wp plugin get hide-my-wp-ghost --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 5.4.02 or later in the WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to paths containing 'showFile' or attempts to access files like wp-config.php via the plugin.

Network Indicators:

  • Suspicious GET requests with parameters attempting directory traversal sequences (e.g., '../') to the plugin endpoint.

SIEM Query:

source="web_logs" AND (uri="*showFile*" AND (uri="*../*" OR uri="*wp-config.php*"))

🔗 References

📤 Share & Export