CVE-2025-3300

7.2 HIGH

📋 TL;DR

The WPMasterToolKit WordPress plugin contains a directory traversal vulnerability that allows authenticated attackers with Administrator privileges to read and modify arbitrary files on the server. This affects all versions up to and including 2.5.2. Attackers could access sensitive configuration files, database credentials, or other critical system files.

💻 Affected Systems

Products:
  • WPMasterToolKit (WPMTK) – All in one plugin for WordPress
Versions: All versions up to and including 2.5.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated Administrator access to exploit. Affects all WordPress installations using vulnerable plugin versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through modification of critical system files, installation of backdoors, theft of sensitive data including database credentials, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive WordPress configuration files (wp-config.php), theft of database credentials, and potential privilege escalation through file manipulation.

🟢

If Mitigated

Limited impact if proper file permissions are set, web server runs with minimal privileges, and critical files are outside web root.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Administrator credentials but is technically simple once authenticated. Directory traversal vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.5.2

Vendor Advisory: https://wordpress.org/plugins/wpmastertoolkit/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WPMasterToolKit plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Remove Administrator Access

all

Temporarily remove Administrator privileges from untrusted users while maintaining essential admin access.

File Permission Hardening

linux

Set restrictive file permissions on sensitive directories and configuration files.

chmod 600 wp-config.php
chmod 755 wp-content/plugins/
find /var/www/html -type f -exec chmod 644 {} \;
find /var/www/html -type d -exec chmod 755 {} \;

🧯 If You Can't Patch

  • Immediately deactivate and remove the WPMasterToolKit plugin from all WordPress installations.
  • Implement strict access controls and monitor Administrator account activity for suspicious file access patterns.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for WPMasterToolKit version. If version is 2.5.2 or lower, system is vulnerable.

Check Version:

wp plugin list --name=wpmastertoolkit --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is higher than 2.5.2 in WordPress admin panel. Test file access functionality to ensure directory traversal is prevented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs (e.g., ../ sequences in URLs)
  • Multiple failed file access attempts from Administrator accounts
  • Access to sensitive files like wp-config.php, /etc/passwd, or other system files

Network Indicators:

  • HTTP requests containing directory traversal sequences (../, ..\) to plugin endpoints
  • Unusual file download patterns from plugin URLs

SIEM Query:

source="web_server_logs" AND (url="*../*" OR url="*..\\*") AND url="*wpmastertoolkit*"

🔗 References

📤 Share & Export