CVE-2025-24605

4.9 MEDIUM

📋 TL;DR

This path traversal vulnerability in the WOLF WordPress plugin allows attackers to access files outside the intended directory. It affects all WordPress sites running WOLF plugin versions up to 1.0.8.5. Attackers could potentially read sensitive files on the server.

💻 Affected Systems

Products:
  • WordPress WOLF plugin (realmag777 WOLF)
Versions: n/a through 1.0.8.5
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive configuration files (like wp-config.php) containing database credentials, leading to data theft or further system access.

🟠

Likely Case

Unauthorized reading of sensitive files including configuration files, user data, or other WordPress files, potentially enabling credential harvesting or information disclosure.

🟢

If Mitigated

Limited impact due to proper file permissions, web server restrictions, or security plugins blocking directory traversal attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are commonly exploited and weaponized quickly due to their simplicity and potential impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.8.6 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/bulk-editor/vulnerability/wordpress-wolf-plugin-1-0-8-5-path-traversal-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WOLF' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin, then install latest version from WordPress repository.

🔧 Temporary Workarounds

Disable WOLF plugin

all

Temporarily disable the vulnerable plugin until patched version is available

wp plugin deactivate wolf

Web Application Firewall rule

all

Block path traversal patterns in requests

Add WAF rule to block requests containing '../' or similar traversal patterns

🧯 If You Can't Patch

  • Disable or remove the WOLF plugin entirely from WordPress installation
  • Implement strict file permissions and directory restrictions at web server level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for WOLF plugin version. If version is 1.0.8.5 or earlier, system is vulnerable.

Check Version:

wp plugin list --name=wolf --field=version

Verify Fix Applied:

Verify WOLF plugin version is 1.0.8.6 or later in WordPress admin panel. Test path traversal attempts should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' patterns to WOLF plugin endpoints
  • Multiple 403/404 errors from same IP targeting plugin files
  • Unusual file access patterns in web server logs

Network Indicators:

  • HTTP requests with traversal sequences (../, ..\, %2e%2e%2f)
  • Requests to WOLF plugin endpoints with file path parameters

SIEM Query:

source="web_server_logs" AND (uri="*wolf*" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*"))

🔗 References

📤 Share & Export