CVE-2026-25027

7.5 HIGH

📋 TL;DR

This CVE describes a PHP Local File Inclusion vulnerability in the Unicamp WordPress theme. Attackers can include arbitrary local files through improper filename control in include/require statements, potentially leading to sensitive information disclosure or code execution. WordPress sites using Unicamp theme versions up to and including 2.7.1 are affected.

💻 Affected Systems

Products:
  • ThemeMove Unicamp WordPress Theme
Versions: n/a through <= 2.7.1
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Unicamp theme active. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, and website defacement.

🟠

Likely Case

Sensitive file disclosure (configuration files, database credentials) and limited code execution within web server context.

🟢

If Mitigated

Information disclosure limited to publicly accessible files only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of file paths but is straightforward once identified. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >2.7.1

Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/unicamp/vulnerability/wordpress-unicamp-theme-2-7-1-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Unicamp theme is active. 4. Update theme to latest version (>2.7.1) via WordPress updates or manual upload. 5. Verify theme version in theme details.

🔧 Temporary Workarounds

Disable vulnerable theme

all

Switch to default WordPress theme temporarily to remove attack surface

wp theme activate twentytwentyfour

Web application firewall rule

linux

Block requests containing local file inclusion patterns

ModSecurity rule: SecRule ARGS "\.\./" "id:1001,phase:2,deny,status:403,msg:'Local File Inclusion attempt'

🧯 If You Can't Patch

  • Implement strict file permission controls on web server directories
  • Deploy web application firewall with LFI detection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in wp-content/themes/unicamp/style.css or via WordPress admin panel > Appearance > Themes

Check Version:

wp theme list --field=name,status,version | grep unicamp

Verify Fix Applied:

Confirm theme version is >2.7.1 and test LFI payloads return 403/404 errors instead of file contents

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with ../ patterns in parameters
  • Access to sensitive files like /etc/passwd from web logs
  • PHP include/require errors with unusual file paths

Network Indicators:

  • Unusual file extension requests (.php with parameter manipulation)
  • Repeated requests with directory traversal sequences

SIEM Query:

source="web_access.log" AND (uri="*../*" OR uri="*/etc/passwd*" OR uri="*/wp-config.php*")

🔗 References

📤 Share & Export