CVE-2025-60049

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress Soleil theme users running versions up to and including 1.17, potentially leading to sensitive information disclosure or code execution.

💻 Affected Systems

Products:
  • WordPress Soleil Theme
Versions: All versions up to and including 1.17
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Soleil theme active. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through local file inclusion leading to remote code execution, sensitive file disclosure (including configuration files with credentials), and complete website takeover.

🟠

Likely Case

Sensitive information disclosure (database credentials, configuration files), limited file system access, and potential privilege escalation through included PHP files.

🟢

If Mitigated

Limited impact with proper file permissions, web server restrictions, and PHP security configurations in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of vulnerable endpoints but is straightforward once identified. Public proof-of-concept exists in vulnerability databases.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.17

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/soleil/vulnerability/wordpress-soleil-theme-1-17-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update Soleil theme to latest version via WordPress admin panel. 2. If auto-update unavailable, download latest version from official repository. 3. Replace theme files via FTP/SFTP. 4. Clear WordPress cache if applicable.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Temporarily switch to default WordPress theme to mitigate vulnerability

wp theme activate twentytwentyfour

Restrict PHP file inclusion

linux

Add PHP configuration to restrict file inclusion paths

php_admin_value open_basedir "/var/www/html:/tmp"
php_admin_value allow_url_include Off

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block file inclusion patterns
  • Restrict file system permissions for web server user to read-only access for necessary directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Soleil theme version. If version is 1.17 or lower, system is vulnerable.

Check Version:

wp theme list --field=name,status,version | grep soleil

Verify Fix Applied:

Verify theme version is greater than 1.17 in WordPress admin panel. Test vulnerable endpoints with safe payloads to confirm patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in access logs (e.g., ../../../etc/passwd)
  • Multiple 404 errors followed by successful requests to unusual file paths
  • PHP error logs showing include/require warnings with unexpected paths

Network Indicators:

  • HTTP requests with file path traversal patterns in parameters
  • Requests to theme-specific endpoints with file inclusion parameters

SIEM Query:

source="web_access_logs" AND (uri="*../*" OR uri="*/etc/*" OR uri="*/proc/*") AND status=200

🔗 References

📤 Share & Export