CVE-2025-47531

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress sites using XT Event Widget for Social Events plugin versions up to 1.1.7, potentially leading to sensitive information disclosure or code execution.

💻 Affected Systems

Products:
  • Xylus Themes XT Event Widget for Social Events WordPress plugin
Versions: n/a through 1.1.7
Operating Systems: Any OS running WordPress with PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version. PHP configuration may affect exploitability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through local file inclusion leading to remote code execution, sensitive file disclosure (config files, passwords), and complete site takeover.

🟠

Likely Case

Sensitive information disclosure (database credentials, configuration files), limited file system access, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper file permissions, web application firewalls, and restricted PHP configurations preventing file inclusion.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Local File Inclusion (LFI) vulnerabilities are commonly exploited. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.8 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/xt-facebook-events/vulnerability/wordpress-xt-event-widget-for-social-events-1-1-7-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'XT Event Widget for Social Events'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin, then install fresh version from WordPress repository.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched version is available

wp plugin deactivate xt-facebook-events

PHP configuration hardening

linux

Set PHP open_basedir restriction and disable allow_url_include

php.ini: open_basedir = /var/www/html
php.ini: allow_url_include = Off

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block LFI attack patterns
  • Restrict file permissions and implement strict access controls on sensitive directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'XT Event Widget for Social Events' version 1.1.7 or earlier

Check Version:

wp plugin get xt-facebook-events --field=version

Verify Fix Applied:

Verify plugin version is 1.1.8 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual file include requests in PHP error logs
  • Requests with ../ patterns or file path traversal attempts
  • Access to sensitive files like /etc/passwd, wp-config.php

Network Indicators:

  • HTTP requests with file inclusion parameters containing path traversal sequences
  • Unusual file extensions in URL parameters

SIEM Query:

source="web_server_logs" AND (uri="*../*" OR uri="*/etc/passwd*" OR uri="*/wp-config.php*")

🔗 References

📤 Share & Export