CVE-2025-67914

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in the VidMov WordPress theme allows attackers to access files outside the intended directory using '.../...//' sequences. It affects all VidMov theme installations from unknown versions through 2.3.8. Attackers can potentially read sensitive server files.

💻 Affected Systems

Products:
  • VidMov WordPress Theme
Versions: n/a through <= 2.3.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations using the VidMov theme. The vulnerability exists in the theme's file handling code.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive configuration files (wp-config.php, /etc/passwd), leading to credential theft, database access, and potential remote code execution.

🟠

Likely Case

Unauthorized reading of sensitive WordPress files, potentially exposing database credentials, user information, and other configuration data.

🟢

If Mitigated

Limited impact with proper file permissions and web server security configurations that restrict access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are commonly exploited and require minimal technical skill. The specific sequence '.../...//' bypasses some basic filters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.9 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/vidmov/vulnerability/wordpress-vidmov-theme-2-3-8-path-traversal-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if VidMov theme update is available. 4. Update to version 2.3.9 or later. 5. If no update appears, manually download latest version from official sources.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Temporarily switch to a different WordPress theme until patched

Web server path restriction

linux

Configure web server to block directory traversal attempts

# For Apache: Add to .htaccess
RewriteCond %{REQUEST_URI} \.\.(/|\.\.) [NC]
RewriteRule .* - [F]

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block path traversal patterns
  • Restrict file permissions and implement principle of least privilege for web server user

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in Appearance > Themes. If VidMov is installed and version is 2.3.8 or earlier, the system is vulnerable.

Check Version:

# Check WordPress theme version via database
SELECT option_value FROM wp_options WHERE option_name = 'template' OR option_name = 'stylesheet';

Verify Fix Applied:

After updating, verify theme version shows 2.3.9 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '.../...//' patterns
  • Access to sensitive files like wp-config.php from unexpected paths
  • 403/404 errors for traversal attempts if blocked

Network Indicators:

  • GET requests with multiple directory traversal sequences
  • Requests to sensitive file paths from non-standard URLs

SIEM Query:

http.url:*..*..* AND (http.url:*wp-config* OR http.url:*/etc/passwd*)

🔗 References

📤 Share & Export