CVE-2025-48136
📋 TL;DR
This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It affects WordPress sites using the Estatik Mortgage Calculator plugin. Attackers can potentially read sensitive files or execute code depending on server configuration.
💻 Affected Systems
- Estatik Mortgage Calculator WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete server compromise, data theft, and website defacement.
Likely Case
Sensitive file disclosure (configuration files, database credentials, user data) and limited file system access.
If Mitigated
Limited impact if proper file permissions and web server configurations restrict access to sensitive directories.
🎯 Exploit Status
Simple HTTP requests can trigger the vulnerability. Public exploit details available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.13 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Mortgage Calculator Estatik'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 2.0.13+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Estatik Mortgage Calculator plugin until patched
wp plugin deactivate estatik-mortgage-calculator
Restrict PHP include paths
linuxConfigure PHP to restrict file inclusion to specific directories
php_admin_value open_basedir "/var/www/html:/tmp"
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block file inclusion patterns
- Restrict file permissions and implement strict directory traversal protections
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Mortgage Calculator Estatik' version ≤2.0.12
Check Version:
wp plugin get estatik-mortgage-calculator --field=version
Verify Fix Applied:
Confirm plugin version is 2.0.13 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual file paths in PHP error logs
- Multiple requests to plugin endpoints with file path parameters
Network Indicators:
- HTTP requests containing '../' patterns or local file paths to plugin endpoints
SIEM Query:
source="web_logs" AND (uri="*wp-content/plugins/estatik-mortgage-calculator/*" AND (param="*../*" OR param="*file=*"))