CVE-2025-58927

8.1 HIGH

📋 TL;DR

This CVE describes a PHP Local File Inclusion vulnerability in the Stallion WordPress theme. Attackers can include arbitrary local files on the server, potentially leading to sensitive information disclosure or code execution. All WordPress sites using Stallion theme version 1.17 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Stallion Theme
Versions: <= 1.17
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Stallion theme active. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through inclusion of malicious PHP files leading to remote code execution, data exfiltration, and complete system takeover.

🟠

Likely Case

Sensitive file disclosure (configuration files, database credentials, source code) and limited code execution through existing PHP files on the server.

🟢

If Mitigated

Information disclosure limited to non-sensitive files if proper file permissions and web server configurations are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability. Public exploit details available on security research sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.17

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/stallion/vulnerability/wordpress-stallion-theme-1-17-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Appearance > Themes
3. Check if Stallion theme is active
4. Update to latest version (>1.17) if available
5. If no update available, deactivate and remove the theme

🔧 Temporary Workarounds

Disable Stallion Theme

all

Deactivate and remove the vulnerable theme

wp theme deactivate stallion
wp theme delete stallion

Web Application Firewall Rule

all

Block requests containing local file inclusion patterns

🧯 If You Can't Patch

  • Deactivate Stallion theme immediately and switch to a secure alternative
  • Implement strict file permissions and disable PHP execution in upload directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in wp-content/themes/stallion/style.css or via WordPress admin panel

Check Version:

wp theme list --field=name,status,version | grep stallion

Verify Fix Applied:

Confirm theme version is >1.17 or theme is completely removed

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with suspicious file paths in parameters
  • Multiple 404 errors followed by successful file access
  • Access to sensitive files like /etc/passwd, wp-config.php

Network Indicators:

  • HTTP requests containing '../' sequences or absolute file paths
  • Requests to theme files with unusual parameters

SIEM Query:

source="web_access_logs" AND (uri="*stallion*" AND (param="*../*" OR param="*/etc/*" OR param="*wp-config*"))

🔗 References

📤 Share & Export