CVE-2025-32925
📋 TL;DR
This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It affects WordPress sites using the SUMO Reward Points plugin, potentially leading to sensitive information disclosure or remote code execution. All users of the plugin up to version 30.7.0 are affected.
💻 Affected Systems
- SUMO Reward Points WordPress Plugin
📦 What is this software?
Sumo Reward Points by Fantasticplugins
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise through remote code execution, allowing attackers to steal sensitive data, install backdoors, or pivot to other systems.
Likely Case
Sensitive file disclosure (configuration files, database credentials, user data) leading to further exploitation or data theft.
If Mitigated
Limited impact if file permissions are restrictive and web server runs with minimal privileges.
🎯 Exploit Status
Exploitation requires specific conditions but is straightforward once identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 30.7.0
Restart Required: No
Instructions:
1. Update the SUMO Reward Points plugin to the latest version via WordPress admin panel. 2. Verify the update completed successfully. 3. Test plugin functionality after update.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the SUMO Reward Points plugin until patched.
wp plugin deactivate rewardsystem
Restrict File Access
linuxConfigure web server to restrict access to sensitive directories.
# Add to .htaccess for Apache:
<FilesMatch "\.(php|inc|conf|ini|log|sql)$">
Order allow,deny
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block LFI patterns
- Restrict PHP execution in upload directories and disable dangerous functions
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel for plugin version. If SUMO Reward Points is installed and version is 30.7.0 or earlier, the system is vulnerable.
Check Version:
wp plugin get rewardsystem --field=version
Verify Fix Applied:
Verify plugin version is higher than 30.7.0 in WordPress admin panel and test plugin functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual include/require statements in PHP logs
- Access to sensitive files like /etc/passwd, wp-config.php
- Multiple failed file inclusion attempts
Network Indicators:
- HTTP requests with file path traversal patterns
- Requests to plugin endpoints with file parameters
SIEM Query:
source="web_logs" AND (uri="*include=*" OR uri="*require=*" OR uri="*file=*") AND (uri="*../*" OR uri="*/etc/*" OR uri="*wp-config*")