CVE-2025-6326

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to include arbitrary local files through PHP's include/require statements in the Inset WordPress theme. Attackers can read sensitive files like configuration files or potentially execute code. All WordPress sites using vulnerable versions of the Inset theme are affected.

💻 Affected Systems

Products:
  • AncoraThemes Inset WordPress Theme
Versions: All versions up to and including 1.18.0
Operating Systems: Any OS running PHP and WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Inset theme active. PHP configuration with allow_url_include disabled does NOT prevent this local file inclusion.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and website defacement.

🟠

Likely Case

Information disclosure of sensitive files like wp-config.php containing database credentials.

🟢

If Mitigated

Limited impact if file permissions restrict access to sensitive files and web server runs with minimal privileges.

🌐 Internet-Facing: HIGH - WordPress themes are directly accessible via web requests, making exploitation trivial.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.18.0

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/inset/vulnerability/wordpress-inset-1-18-0-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Inset theme is active. 4. Update to latest version or replace with alternative theme. 5. Verify theme files are updated.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Switch to a different WordPress theme until patch is applied

wp theme deactivate inset
wp theme activate twentytwentyfour

Restrict file access

all

Configure web server to deny access to sensitive directories

# Add to .htaccess for Apache:
<FilesMatch "\.(php|inc|conf|config)$">
  Deny from all
</FilesMatch>
# Nginx configuration:
location ~ /\.(php|inc|conf|config)$ {
  deny all;
}

🧯 If You Can't Patch

  • Remove or deactivate the Inset theme completely
  • Implement web application firewall rules to block LFI patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in Appearance > Themes or run: wp theme list --field=name,version | grep inset

Check Version:

wp theme list --field=name,version | grep inset

Verify Fix Applied:

Confirm theme version is greater than 1.18.0 and test LFI attempts return errors instead of file contents

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with file inclusion patterns in query strings
  • Access to sensitive files like wp-config.php from web requests
  • PHP include/require errors in web server logs

Network Indicators:

  • HTTP requests containing '..' or absolute paths in parameters
  • Unexpected file downloads via web endpoints

SIEM Query:

web_access_logs | where url contains ".." or url contains "/etc/" or url contains "wp-config"

🔗 References

📤 Share & Export