CVE-2025-31633

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress sites using the Kiamo - Responsive Business Service theme versions up to 1.3.3, potentially leading to sensitive information disclosure or remote code execution.

💻 Affected Systems

Products:
  • Kiamo - Responsive Business Service WordPress Theme
Versions: n/a through 1.3.3
Operating Systems: Any OS running PHP and WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable theme activated. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through Local File Inclusion leading to Remote Code Execution, allowing attackers to execute arbitrary code, access sensitive files like /etc/passwd or wp-config.php, and take complete control of the WordPress site and underlying server.

🟠

Likely Case

Sensitive information disclosure including database credentials, configuration files, and user data, potentially leading to site defacement or privilege escalation within WordPress.

🟢

If Mitigated

Limited impact with proper file permissions, web application firewalls, and restricted PHP execution environments preventing file inclusion outside designated directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation typically involves manipulating URL parameters to include local files. Public proof-of-concept exists on security research sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.4 or later

Vendor Advisory: https://patchstack.com/database/wordpress/theme/kiamo/vulnerability/wordpress-kiamo-responsive-business-service-wordpress-theme-1-3-3-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Kiamo theme update is available. 4. Update to version 1.3.4 or later. 5. If no update available, replace with patched version from official source.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Temporarily switch to default WordPress theme until patch is applied

wp theme activate twentytwentyfour

Web Application Firewall rule

all

Block requests containing local file inclusion patterns in URL parameters

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user-controlled parameters
  • Configure PHP with open_basedir restrictions and disable dangerous functions

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in Appearance > Themes or via wp theme list command

Check Version:

wp theme list --field=name,status,version | grep kiamo

Verify Fix Applied:

Confirm theme version is 1.3.4 or later and test LFI payloads return errors instead of file contents

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with ../ sequences, /etc/passwd, or wp-config.php in URL parameters
  • PHP warnings about failed file inclusions

Network Indicators:

  • Unusual GET requests with file paths in parameters
  • Traffic patterns matching LFI exploitation attempts

SIEM Query:

source="web_logs" AND (url="*../*" OR url="*/etc/passwd*" OR url="*/wp-config.php*")

🔗 References

📤 Share & Export