CVE-2025-58941

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress Fabric theme users running versions up to and including 1.5.0, potentially leading to sensitive information disclosure or code execution.

💻 Affected Systems

Products:
  • WordPress Fabric Theme
Versions: n/a through <= 1.5.0
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PHP environment with allow_url_include disabled (default), but local file inclusion still works. WordPress multisite installations may have different impact.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through local file inclusion leading to remote code execution, sensitive file disclosure (including configuration files with credentials), and complete website takeover.

🟠

Likely Case

Sensitive file disclosure (wp-config.php, /etc/passwd, etc.), partial code execution through log poisoning, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper file permissions and web server configurations, potentially only allowing read access to non-sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of vulnerable endpoints but is straightforward once identified. Public proof-of-concept exists on security research sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.5.0

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/fabric/vulnerability/wordpress-fabric-theme-1-5-0-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Appearance > Themes
3. Check if Fabric theme is active
4. Update to latest version (>1.5.0) if available
5. If no update available, replace with secure alternative theme

🔧 Temporary Workarounds

Disable vulnerable theme

all

Temporarily disable the Fabric theme and switch to default WordPress theme

wp theme deactivate fabric
wp theme activate twentytwentyfour

Restrict PHP file operations

linux

Add .htaccess rules to restrict file inclusion in theme directory

Add to .htaccess in theme directory: php_flag allow_url_include off
Add: php_admin_value open_basedir /var/www/html

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block file inclusion patterns
  • Restrict file system permissions and implement strict open_basedir restrictions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Fabric theme version <=1.5.0

Check Version:

wp theme list --name=fabric --field=version

Verify Fix Applied:

Verify theme version is >1.5.0 or theme has been removed/replaced

📡 Detection & Monitoring

Log Indicators:

  • Unusual file paths in PHP error logs
  • Multiple 404 errors for non-existent theme files
  • Requests containing '../' patterns in theme-related URLs

Network Indicators:

  • HTTP requests with file inclusion parameters to theme endpoints
  • Unusual file extensions in theme directory requests

SIEM Query:

source="web_logs" AND (uri="*fabric*" AND (uri="*../*" OR uri="*php://*" OR uri="*file=*"))

🔗 References

📤 Share & Export