CVE-2025-9874

7.5 HIGH

📋 TL;DR

The Ultimate Classified Listings WordPress plugin has a Local File Inclusion vulnerability that allows authenticated attackers with Contributor-level access or higher to include and execute arbitrary PHP files on the server. This can lead to remote code execution, data theft, or privilege escalation. All WordPress sites using this plugin version 1.6 or earlier are affected.

💻 Affected Systems

Products:
  • Ultimate Classified Listings WordPress Plugin
Versions: All versions up to and including 1.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least Contributor role; WordPress multisite installations may be affected differently.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, leading to data exfiltration, ransomware deployment, or complete site takeover.

🟠

Likely Case

Unauthorized file access leading to sensitive data exposure, privilege escalation to administrator, or backdoor installation.

🟢

If Mitigated

Limited impact if proper file upload restrictions and server hardening are in place, but still potential for data leakage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Contributor-level access; attackers may use social engineering or compromised accounts to gain initial access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/ultimate-classified-listings/trunk/classes/class-shortcodes.php#L49

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Ultimate Classified Listings. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.7+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Remove or disable the 'uclwp_dashboard' shortcode functionality

Edit wp-content/plugins/ultimate-classified-listings/classes/class-shortcodes.php and comment out or remove the vulnerable shortcode registration

Restrict file uploads

all

Prevent PHP file uploads through WordPress

Add to wp-config.php: define('ALLOW_UNFILTERED_UPLOADS', false);

🧯 If You Can't Patch

  • Temporarily deactivate the Ultimate Classified Listings plugin
  • Implement strict file upload restrictions and disable PHP execution in upload directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Ultimate Classified Listings version number

Check Version:

wp plugin list --name='ultimate-classified-listings' --field=version

Verify Fix Applied:

Verify plugin version is 1.7 or higher and test shortcode functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file inclusion attempts in web server logs
  • Multiple failed authentication attempts followed by successful Contributor login
  • POST requests containing 'uclwp_dashboard' parameter with file paths

Network Indicators:

  • Unusual outbound connections from web server after file inclusion requests

SIEM Query:

source="web_server" AND (uri="*uclwp_dashboard*" OR uri="*include*" OR uri="*require*")

🔗 References

📤 Share & Export