CVE-2025-53435
📋 TL;DR
This CVE describes a PHP Local File Inclusion vulnerability in the Plan My Day WordPress theme. Attackers can include arbitrary local files, potentially leading to sensitive information disclosure or remote code execution. All WordPress sites using Plan My Day theme version 1.1.13 or earlier are affected.
💻 Affected Systems
- WordPress Plan My Day Theme
📦 What is this software?
Plan My Day by Axiomthemes
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data exfiltration, and persistent backdoor installation.
Likely Case
Sensitive file disclosure (configuration files, database credentials) and limited code execution within web server context.
If Mitigated
No impact if proper file permissions and web server configurations prevent unauthorized file access.
🎯 Exploit Status
Exploitation requires knowledge of file paths but is straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: >1.1.13
Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/planmyday/vulnerability/wordpress-plan-my-day-theme-1-1-13-local-file-inclusion-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Plan My Day theme updates. 4. Update to latest version. 5. If no update available, replace with secure alternative theme.
🔧 Temporary Workarounds
Disable vulnerable theme
allSwitch to a different WordPress theme immediately
Restrict PHP file inclusion
linuxConfigure PHP to disable allow_url_include and restrict open_basedir
php_admin_value allow_url_include Off
php_admin_value open_basedir /var/www/html
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block file inclusion patterns
- Restrict file system permissions to web server user
🔍 How to Verify
Check if Vulnerable:
Check WordPress theme version in Appearance > Themes or wp-content/themes/planmyday/style.css
Check Version:
grep 'Version' /path/to/wordpress/wp-content/themes/planmyday/style.css
Verify Fix Applied:
Confirm theme version is >1.1.13 and test file inclusion attempts return errors
📡 Detection & Monitoring
Log Indicators:
- Unusual file path requests in access logs
- PHP include/require errors with suspicious paths
- Multiple 404 errors for non-existent theme files
Network Indicators:
- HTTP requests with file path parameters like ?file=../../../etc/passwd
- Unusual outbound connections after successful exploitation
SIEM Query:
source="web_access.log" AND (uri="*?file=*" OR uri="*?page=*" OR uri="*?include=*") AND status=200