CVE-2025-58900

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to include local PHP files through improper filename control in the UniTravel WordPress theme. Attackers can potentially read sensitive files or execute arbitrary code. All WordPress sites using UniTravel theme versions up to 1.4.2 are affected.

💻 Affected Systems

Products:
  • AncoraThemes UniTravel WordPress Theme
Versions: All versions up to and including 1.4.2
Operating Systems: Any OS running PHP and WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with UniTravel theme active. PHP configuration may affect exploitability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and website defacement.

🟠

Likely Case

Sensitive file disclosure (configuration files, database credentials) and limited code execution.

🟢

If Mitigated

File read access limited to web-accessible directories if proper file permissions are configured.

🌐 Internet-Facing: HIGH - WordPress themes are typically internet-facing and accessible to unauthenticated users.
🏢 Internal Only: MEDIUM - Internal WordPress installations could still be exploited by internal attackers or through phishing.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.3 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/unitravel/vulnerability/wordpress-unitravel-theme-1-4-2-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for UniTravel theme update. 4. Update to version 1.4.3 or later. 5. If no update available, replace with patched version manually.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Switch to a different WordPress theme temporarily

wp theme activate twentytwentyfour
wp theme deactivate unitravel

Restrict PHP file inclusion

linux

Add .htaccess rules to block local file inclusion attempts

RewriteEngine On
RewriteCond %{QUERY_STRING} (.*)php://(.*) [NC,OR]
RewriteCond %{QUERY_STRING} (.*)file://(.*) [NC]
RewriteRule .* - [F,L]

🧯 If You Can't Patch

  • Disable the UniTravel theme and use a different theme
  • Implement web application firewall rules to block file inclusion patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in Appearance > Themes or run: wp theme list --field=name,version | grep unitravel

Check Version:

wp theme get unitravel --field=version

Verify Fix Applied:

Confirm UniTravel theme version is 1.4.3 or higher: wp theme get unitravel --field=version

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with file inclusion parameters in query strings
  • PHP warning/error logs showing file inclusion attempts
  • Access to unusual PHP files via web requests

Network Indicators:

  • HTTP GET requests containing file://, php://, or ../ patterns
  • Requests to theme-specific PHP files with suspicious parameters

SIEM Query:

web.url:*unitravel* AND (web.query:*file:* OR web.query:*php:* OR web.query:*../*)

🔗 References

📤 Share & Export