CVE-2025-58896

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress sites using the Otaku theme from AncoraThemes, potentially leading to sensitive file disclosure or code execution. All sites running Otaku theme version 1.8.0 or earlier are vulnerable.

💻 Affected Systems

Products:
  • AncoraThemes Otaku WordPress Theme
Versions: All versions up to and including 1.8.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Otaku theme active. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through local file inclusion leading to remote code execution, sensitive configuration file disclosure (wp-config.php), and complete site takeover.

🟠

Likely Case

Sensitive file disclosure including database credentials, configuration files, and user data, potentially leading to site defacement or data theft.

🟢

If Mitigated

Limited impact with proper file permissions and security controls, potentially only allowing read access to non-sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and uses simple HTTP requests with path traversal payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.8.0

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/otaku/vulnerability/wordpress-otaku-theme-1-8-0-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Otaku theme update. 4. If update available, click Update Now. 5. If no update available, replace with patched version manually.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Switch to a different WordPress theme until patch is available

Restrict file permissions

linux

Set strict file permissions on sensitive configuration files

chmod 600 wp-config.php
chmod 600 .htaccess

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block LFI patterns
  • Disable theme functionality through WordPress hooks or remove vulnerable files

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel under Appearance > Themes for Otaku theme version 1.8.0 or earlier

Check Version:

grep -r "Version:" wp-content/themes/otaku/style.css

Verify Fix Applied:

Verify theme version is greater than 1.8.0 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with ../ patterns
  • Requests to theme files with unusual parameters
  • Access to sensitive files like wp-config.php

Network Indicators:

  • HTTP GET requests with path traversal payloads
  • Requests to theme PHP files with include parameters

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*wp-config*" OR uri="*otaku*" AND param="*include*")

🔗 References

📤 Share & Export