CVE-2025-2840

5.3 MEDIUM

📋 TL;DR

The DAP to Autoresponders Email Syncing WordPress plugin exposes sensitive server information through a publicly accessible phpinfo.php file. This allows unauthenticated attackers to view PHP configuration details, environment variables, and potentially sensitive data. All WordPress sites using this plugin version 1.0 or earlier are affected.

💻 Affected Systems

Products:
  • DAP to Autoresponders Email Syncing WordPress plugin
Versions: All versions up to and including 1.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation. The phpinfo.php file is publicly accessible without authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials, API keys, or other sensitive configuration data leading to complete system compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Attackers gather server configuration details, PHP settings, and environment variables that could be used for reconnaissance or to inform further attacks against the WordPress installation.

🟢

If Mitigated

Limited exposure of non-critical PHP configuration information with no sensitive credentials or application secrets revealed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only accessing the vulnerable URL. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://wordpress.org/plugins/dap-to-autoresponders-daar/#developers

Restart Required: No

Instructions:

1. Remove the vulnerable plugin entirely. 2. Delete the file /wp-content/plugins/dap-to-autoresponders-daar/infusionsoft_src/phpinfo.php. 3. Consider alternative email syncing plugins.

🔧 Temporary Workarounds

Delete vulnerable file

linux

Remove the publicly accessible phpinfo.php file from the plugin directory

rm /path/to/wordpress/wp-content/plugins/dap-to-autoresponders-daar/infusionsoft_src/phpinfo.php

Block access via .htaccess

linux

Prevent access to the vulnerable file using Apache rewrite rules

<Files "phpinfo.php">
  Order Allow,Deny
  Deny from all
</Files>

🧯 If You Can't Patch

  • Disable or remove the DAP to Autoresponders plugin entirely
  • Implement web application firewall rules to block access to /wp-content/plugins/dap-to-autoresponders-daar/infusionsoft_src/phpinfo.php

🔍 How to Verify

Check if Vulnerable:

Access https://your-site.com/wp-content/plugins/dap-to-autoresponders-daar/infusionsoft_src/phpinfo.php in a browser. If it shows PHP configuration information, the site is vulnerable.

Check Version:

Check WordPress admin panel > Plugins > DAP to Autoresponders Email Syncing for version number

Verify Fix Applied:

Attempt to access the phpinfo.php URL and verify it returns a 404 error or access denied message.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 requests to /wp-content/plugins/dap-to-autoresponders-daar/infusionsoft_src/phpinfo.php
  • Unusual traffic patterns to plugin directories

Network Indicators:

  • GET requests to phpinfo.php file from external IPs
  • Traffic to plugin paths from scanning tools

SIEM Query:

source="web_logs" AND uri="/wp-content/plugins/dap-to-autoresponders-daar/infusionsoft_src/phpinfo.php" AND response="200"

🔗 References

📤 Share & Export