CVE-2025-60066

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to include local PHP files through improper filename control in the Katelyn WordPress theme. Attackers can potentially read sensitive files or execute arbitrary code on affected WordPress installations. All WordPress sites using Katelyn theme versions up to and including 1.0.10 are affected.

💻 Affected Systems

Products:
  • axiomthemes Katelyn WordPress Theme
Versions: n/a through <= 1.0.10
Operating Systems: Any OS running PHP and WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Katelyn theme active. PHP configuration may affect exploitability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, and website defacement.

🟠

Likely Case

Sensitive file disclosure (configuration files, database credentials) and limited code execution.

🟢

If Mitigated

No impact if proper file permissions and web server configurations prevent file inclusion.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to vulnerable endpoints. Public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.0.10

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/katelyn/vulnerability/wordpress-katelyn-theme-1-0-10-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update Katelyn theme to latest version via WordPress admin panel. 2. Verify theme version is >1.0.10. 3. Clear any caching plugins/CDN.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Switch to default WordPress theme until patch is applied

wp theme activate twentytwentyfour

Web Application Firewall rule

all

Block requests containing local file inclusion patterns

🧯 If You Can't Patch

  • Implement strict file permissions (644 for files, 755 for directories)
  • Use web server configuration to restrict PHP file inclusion (disable allow_url_include)

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Katelyn theme version <=1.0.10

Check Version:

wp theme list --field=name,status,version | grep katelyn

Verify Fix Applied:

Verify theme version is >1.0.10 and test vulnerable endpoints with controlled payloads

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with suspicious file paths in parameters
  • PHP include/require errors in web server logs

Network Indicators:

  • Unusual file path patterns in HTTP GET/POST parameters
  • Requests to theme-specific endpoints with file parameters

SIEM Query:

source="web_access.log" AND (uri="*katelyn*" AND (param="*../*" OR param="*php://*" OR param="*file=*"))

🔗 References

📤 Share & Export