CVE-2025-54701

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to include and execute local PHP files on servers running the Unicamp WordPress theme. Attackers can potentially read sensitive files or execute arbitrary code by manipulating file inclusion parameters. All WordPress sites using affected versions of the Unicamp theme are vulnerable.

💻 Affected Systems

Products:
  • ThemeMove Unicamp WordPress Theme
Versions: All versions up to and including 2.6.3
Operating Systems: Any OS running PHP and WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Unicamp theme active. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, allowing attackers to steal data, install backdoors, or pivot to other systems.

🟠

Likely Case

Sensitive file disclosure (configuration files, database credentials) leading to data theft or further exploitation.

🟢

If Mitigated

Limited impact if file permissions are restrictive and web server runs with minimal privileges.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to vulnerable endpoints. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.6.4 or later

Vendor Advisory: https://patchstack.com/database/wordpress/theme/unicamp/vulnerability/wordpress-unicamp-theme-2-6-3-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Unicamp theme update notification. 4. Click 'Update Now' for Unicamp theme. 5. Verify theme version is 2.6.4 or higher.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Temporarily switch to default WordPress theme until patch is applied

Web Application Firewall rule

all

Block requests containing local file inclusion patterns in theme parameters

WAF specific - create rule to block requests with patterns like '..', '/etc/', 'php://' in GET/POST parameters

🧯 If You Can't Patch

  • Implement strict file permissions on web directories to limit readable files
  • Deploy web application firewall with LFI detection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Unicamp theme version. If version is 2.6.3 or lower, system is vulnerable.

Check Version:

wp theme list --field=name,version --path=/path/to/wordpress | grep unicamp

Verify Fix Applied:

After updating, verify Unicamp theme shows version 2.6.4 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with unusual file paths in theme-related parameters
  • Multiple failed attempts to access sensitive files via theme endpoints

Network Indicators:

  • Unusual file path patterns in HTTP GET/POST parameters to theme files
  • Traffic spikes to theme-specific PHP files

SIEM Query:

source="web_logs" AND (uri="*unicamp*" OR uri="*theme*unicamp*") AND (param="*../*" OR param="*/etc/*" OR param="*php://*")

🔗 References

📤 Share & Export