CVE-2025-58945
📋 TL;DR
This vulnerability allows attackers to include local PHP files through improper filename control in the EcoGrow WordPress theme. Attackers can potentially execute arbitrary code or read sensitive files on the server. All WordPress sites using EcoGrow theme versions up to and including 1.7 are affected.
💻 Affected Systems
- axiomthemes EcoGrow WordPress theme
📦 What is this software?
Ecogrow by Axiomthemes
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to data theft, ransomware deployment, or complete site takeover through remote code execution.
Likely Case
Sensitive file disclosure (configuration files, database credentials), limited code execution, or website defacement.
If Mitigated
Attack blocked at web application firewall level or fails due to proper file permissions.
🎯 Exploit Status
Simple HTTP requests can trigger the vulnerability. Public exploit code is available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.7
Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/ecogrow/vulnerability/wordpress-ecogrow-theme-1-7-local-file-inclusion-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Update EcoGrow theme to latest version via WordPress admin panel. 2. If update not available, remove theme completely. 3. Verify theme files are replaced with patched versions.
🔧 Temporary Workarounds
Disable vulnerable theme
allSwitch to default WordPress theme to immediately remove vulnerability
wp theme activate twentytwentyfour
Web Application Firewall rule
linuxBlock requests containing local file inclusion patterns
ModSecurity rule: SecRule ARGS "\.\./" "phase:2,deny,status:403,id:1001"
🧯 If You Can't Patch
- Implement strict file permissions (644 for files, 755 for directories)
- Deploy web application firewall with LFI detection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Appearance > Themes for EcoGrow theme version <= 1.7
Check Version:
wp theme list --field=name,status,version | grep ecogrow
Verify Fix Applied:
Confirm theme version is >1.7 or theme is deactivated/removed
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with ../ sequences in parameters
- PHP include/require errors in web server logs
- Access to sensitive files like /etc/passwd in logs
Network Indicators:
- Unusual file paths in URL parameters
- Requests to theme files with traversal sequences
SIEM Query:
source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR params="*include*" OR params="*require*")