CVE-2025-64287

8.1 HIGH

📋 TL;DR

This CVE describes a PHP Local File Inclusion vulnerability in the Alloggio WordPress theme for hotel booking websites. Attackers can exploit improper filename control in include/require statements to read sensitive files on the server. WordPress sites using Alloggio theme version 1.8 or earlier are affected.

💻 Affected Systems

Products:
  • Edge-Themes Alloggio - Hotel Booking WordPress Theme
Versions: All versions up to and including 1.8
Operating Systems: Any OS running PHP (Linux, Windows, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Alloggio theme active. PHP configuration with allow_url_include disabled may limit impact.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via reading sensitive files like /etc/passwd, database credentials, or session files, potentially leading to remote code execution.

🟠

Likely Case

Information disclosure of sensitive server files, configuration files, or source code, which could enable further attacks.

🟢

If Mitigated

Limited impact if proper file permissions, web server restrictions, and input validation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation typically involves manipulating URL parameters to include local files. Public proof-of-concept exists in vulnerability databases.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.8 (check vendor for specific fixed version)

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/alloggio/vulnerability/wordpress-alloggio-hotel-booking-theme-theme-1-8-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update Alloggio theme to latest version via WordPress admin panel. 2. If update not available, remove theme and replace with secure alternative. 3. Verify theme files are properly sanitized.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Temporarily switch to default WordPress theme to mitigate risk while awaiting patch

wp theme activate twentytwentyfour

Restrict file inclusion

linux

Configure PHP to disable dangerous functions and restrict file access

php_admin_value allow_url_include Off
php_admin_value open_basedir /var/www/html

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block LFI patterns in requests
  • Apply strict file permissions and disable directory listing on web server

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for Alloggio theme version. If version is 1.8 or earlier, system is vulnerable.

Check Version:

wp theme list --field=name,status,version | grep alloggio

Verify Fix Applied:

Verify theme version is updated beyond 1.8 and test LFI attempts return errors instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in access logs (e.g., ../../etc/passwd)
  • PHP include/require errors with suspicious paths

Network Indicators:

  • HTTP requests with path traversal sequences in parameters
  • Abnormal file extension requests to PHP files

SIEM Query:

source="web_access_logs" AND (uri="*../*" OR uri="*/etc/*" OR uri="*passwd*")

🔗 References

📤 Share & Export