CVE-2025-58889
📋 TL;DR
This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress Towny theme users running versions up to and including 1.16, potentially leading to information disclosure or code execution.
💻 Affected Systems
- Towny WordPress Theme
📦 What is this software?
Towny by Axiomthemes
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete server compromise, data theft, and website defacement.
Likely Case
Local file inclusion allowing sensitive file reading (configuration files, credentials) and limited code execution.
If Mitigated
Limited impact with proper file permissions and web server hardening, potentially only information disclosure.
🎯 Exploit Status
Exploitation is straightforward with publicly available proof-of-concept code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: >1.16
Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/towny/vulnerability/wordpress-towny-theme-1-16-local-file-inclusion-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Towny theme is installed. 4. If version is 1.16 or lower, update to latest version or replace with alternative theme. 5. Remove any unused Towny theme files.
🔧 Temporary Workarounds
Disable Towny Theme
allTemporarily disable the vulnerable theme until patched
wp theme deactivate towny
wp theme activate twentytwentyfour
Restrict PHP File Functions
allModify php.ini to disable dangerous functions
disable_functions = allow_url_fopen,allow_url_include
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block file inclusion patterns
- Restrict file permissions and implement strict directory traversal protections
🔍 How to Verify
Check if Vulnerable:
Check WordPress theme version in wp-content/themes/towny/style.css or via WordPress admin panel
Check Version:
grep 'Version:' wp-content/themes/towny/style.css
Verify Fix Applied:
Confirm Towny theme version is greater than 1.16 or theme is completely removed
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in PHP error logs
- HTTP requests with file inclusion parameters like ?file=../../etc/passwd
Network Indicators:
- HTTP requests containing ../ patterns or PHP wrapper strings
SIEM Query:
source="web_access_logs" AND (uri="*..*" OR uri="*php://*" OR uri="*file=*" OR uri="*include=*")