CVE-2025-30580

10.0 CRITICAL

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of the DigiWidgets Image Editor WordPress plugin. Attackers can inject malicious code through the plugin's functionality, potentially taking full control of affected WordPress sites. All WordPress installations using DigiWidgets Image Editor versions up to 1.10 are affected.

💻 Affected Systems

Products:
  • DigiWidgets Image Editor WordPress Plugin
Versions: n/a through 1.10
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin enabled, regardless of WordPress version or underlying OS.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, website defacement, and use as a foothold for lateral movement within the network.

🟠

Likely Case

Website takeover, malware injection, credential theft, and backdoor installation for persistent access.

🟢

If Mitigated

Limited impact with proper web application firewalls, file integrity monitoring, and restricted file permissions preventing code execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is publicly documented with technical details available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/digiwidgets-image-editor/vulnerability/wordpress-digiwidgets-image-editor-1-10-remote-code-execution-rce-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find DigiWidgets Image Editor. 4. Click 'Update Now' if update available. 5. If no update, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Immediate Plugin Deactivation

all

Disable the vulnerable plugin to prevent exploitation while planning permanent fix.

wp plugin deactivate digiwidgets-image-editor

Web Application Firewall Rule

all

Block requests to vulnerable plugin endpoints using WAF.

# Add rule to block /wp-content/plugins/digiwidgets-image-editor/ paths

🧯 If You Can't Patch

  • Deactivate and remove the DigiWidgets Image Editor plugin immediately
  • Implement strict file upload restrictions and disable PHP execution in upload directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for DigiWidgets Image Editor version ≤1.10

Check Version:

wp plugin list --name=digiwidgets-image-editor --field=version

Verify Fix Applied:

Confirm plugin version is 1.11 or higher, or verify plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-content/plugins/digiwidgets-image-editor/
  • PHP file creation in unexpected directories
  • Webshell-like file names in uploads

Network Indicators:

  • HTTP requests with suspicious parameters targeting the plugin endpoint
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND uri="/wp-content/plugins/digiwidgets-image-editor/*" AND (method="POST" OR params CONTAINS "php" OR params CONTAINS "eval")

🔗 References

📤 Share & Export