CVE-2025-25174

10.0 CRITICAL

📋 TL;DR

This CVE describes a PHP Local File Inclusion vulnerability in the BeeTeam368 Extensions WordPress plugin, allowing attackers to include and execute arbitrary local files on the server. It affects all versions up to 1.9.4, potentially leading to remote code execution, data theft, or system compromise. WordPress sites using this plugin are at risk.

💻 Affected Systems

Products:
  • BeeTeam368 Extensions WordPress plugin
Versions: n/a through 1.9.4
Operating Systems: Any OS running PHP (e.g., Linux, Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the plugin enabled; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution, leading to data exfiltration, malware deployment, or complete system takeover.

🟠

Likely Case

Unauthenticated attackers can read sensitive files (e.g., configuration files, passwords) or execute arbitrary PHP code, resulting in data breaches or site defacement.

🟢

If Mitigated

If proper file permissions and web server hardening are in place, impact may be limited to file disclosure without code execution.

🌐 Internet-Facing: HIGH, as the vulnerability is in a WordPress plugin accessible via the web and can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it, but external exposure increases the overall risk significantly.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward, with public proof-of-concept available, making it easy for attackers to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/beeteam368-extensions/vulnerability/wordpress-beeteam368-extensions-plugin-1-9-4-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find BeeTeam368 Extensions and update to version 1.9.5 or later. 4. Verify the update completes successfully.

🔧 Temporary Workarounds

Disable the plugin

all

Temporarily deactivate the BeeTeam368 Extensions plugin to prevent exploitation until patching is possible.

wp plugin deactivate beeteam368-extensions

Restrict file inclusion paths

linux

Configure PHP settings to limit file inclusion to trusted directories using open_basedir or similar restrictions.

open_basedir = /var/www/html:/tmp

🧯 If You Can't Patch

  • Apply web application firewall (WAF) rules to block requests containing suspicious file inclusion patterns.
  • Monitor and restrict access to the plugin's vulnerable endpoints using server-level access controls or .htaccess rules.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 1.9.4 or lower, it is vulnerable.

Check Version:

wp plugin get beeteam368-extensions --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 1.9.5 or later in the WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to plugin files with parameters like 'file=' or 'include=' pointing to local paths
  • PHP error logs showing file inclusion failures or warnings

Network Indicators:

  • HTTP traffic to vulnerable plugin endpoints with malicious file paths in query strings

SIEM Query:

source="web_access_logs" AND uri="*beeteam368-extensions*" AND (query="*file=*" OR query="*include=*")

🔗 References

📤 Share & Export