Skip to main content

Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure

Medium
Published: Tue Aug 26 2025 (08/26/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure

AI-Powered Analysis

AILast updated: 08/27/2025, 01:26:39 UTC

Technical Analysis

The Birth Chart Compatibility WordPress Plugin version 2.0 contains a Full Path Disclosure (FPD) vulnerability. This type of vulnerability occurs when an application reveals the full filesystem path of the server in error messages or other outputs. In this case, the plugin inadvertently exposes the absolute path to its files on the web server. Such information disclosure can aid attackers in crafting more targeted attacks by revealing the directory structure, installed software versions, and potentially sensitive configuration details. The vulnerability is exploitable remotely without authentication, as it involves information leakage through normal web requests. The presence of exploit code written in C indicates that an attacker can automate the retrieval of this information, potentially integrating it into larger attack frameworks. Although the vulnerability does not directly allow code execution or data modification, it lowers the barrier for further exploitation by providing critical reconnaissance information. The absence of patch links suggests that no official fix has been released yet, increasing the risk for users of this plugin. Since the plugin is WordPress-based, it is likely deployed on web servers running PHP and Apache or similar stacks, making it relevant to many web hosting environments.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through information disclosure. Attackers can leverage the full path information to identify server configurations, directory structures, and possibly other installed plugins or themes, which can facilitate more sophisticated attacks such as local file inclusion, remote code execution, or privilege escalation. Organizations relying on WordPress sites with this plugin may face increased exposure to targeted attacks, especially if combined with other vulnerabilities. The impact on confidentiality is moderate due to the leakage of internal server details. Integrity and availability impacts are indirect but possible if attackers use the disclosed information to compromise the system further. Given the widespread use of WordPress in Europe, including by SMEs and public sector entities, this vulnerability could be a stepping stone for attackers aiming at sensitive data or service disruption.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Birth Chart Compatibility Plugin version 2.0. If found, they should disable or remove the plugin until a patch is available. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to block requests that trigger the path disclosure or sanitize error messages to prevent full path output. Additionally, configuring PHP and web server error handling to avoid displaying detailed errors to end users is critical. Organizations should also ensure that directory listing is disabled on web servers and that file permissions are properly set to limit access to sensitive files. Regular vulnerability scanning and monitoring for unusual activity on WordPress sites can help detect exploitation attempts early. Finally, maintaining an inventory of plugins and promptly applying updates when patches are released is essential to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52419
Has Exploit Code
true
Code Language
c

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure

/*
 * Exploit Title : Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure
 * Author       : Byte Reaper
 * Telegram     : @ByteReaper0
 * CVE          : CVE-2025-6082
 * Software Link : https://frp.wordpress.org/plugins/birth-chart-compatibility/
 * Description  : Proof‑of‑Concept exploits the Full Path Disclosure bug in the
 *                “Birth Chart Compatibility” WordPress plugin (<=v2.0). It sends
 *                an HTTP GET request to the plugin’s index.php endpoint,
... (8722 more characters)
Code Length: 9,222 characters • Language: C/C++

Threat ID: 68ae5e7aad5a09ad005d88ca

Added to database: 8/27/2025, 1:25:14 AM

Last enriched: 8/27/2025, 1:26:39 AM

Last updated: 8/31/2025, 1:16:54 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats