CVE-2025-58932

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress sites using the Prisma theme from AxiomThemes. Attackers can potentially read sensitive files or execute arbitrary code.

💻 Affected Systems

Products:
  • AxiomThemes Prisma WordPress Theme
Versions: All versions up to and including 1.10
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Prisma theme active. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through arbitrary code execution leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Sensitive file disclosure (configuration files, database credentials, user data) and limited code execution within web server context.

🟢

If Mitigated

Limited impact if file permissions are restrictive and web server runs with minimal privileges, though information disclosure remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.10

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/prisma/vulnerability/wordpress-prisma-theme-1-10-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update Prisma theme to latest version via WordPress admin panel. 2. If update unavailable, remove theme and replace with secure alternative. 3. Clear any cached theme files.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Switch to default WordPress theme to immediately remove vulnerability

wp theme activate twentytwentyfour
wp theme delete prisma

Restrict PHP file functions

linux

Use PHP disable_functions to limit include/require capabilities

Add 'disable_functions = include,require,include_once,require_once' to php.ini

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block file inclusion patterns
  • Restrict web server permissions to prevent reading sensitive system files

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for Prisma theme version. If version <= 1.10, system is vulnerable.

Check Version:

wp theme list --field=name,status,version | grep prisma

Verify Fix Applied:

Confirm theme version is >1.10 or theme is removed. Test with controlled LFI payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file paths in PHP error logs
  • Multiple include/require failures with path traversal patterns
  • Requests to theme files with suspicious parameters

Network Indicators:

  • HTTP requests containing '../' patterns in parameters
  • Requests to theme PHP files with file path parameters

SIEM Query:

web.url:*prisma* AND (web.param:*../* OR web.param:*php://* OR web.param:*file=*)

🔗 References

📤 Share & Export