CVE-2025-0682: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeREX Addons
CVE-2025-0682 is a high-severity Local File Inclusion (LFI) vulnerability in the ThemeREX Addons WordPress plugin, affecting all versions up to 2. 33. 0. It arises from improper control of the filename in the 'trx_sc_reviews' shortcode's 'type' attribute, allowing authenticated users with contributor-level or higher permissions to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability requires no user interaction but does require authentication with contributor or higher privileges. Although no known exploits are currently in the wild, the CVSS score of 8. 8 reflects the high impact and ease of exploitation. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential compromise. Countries with significant WordPress usage and active web development communities are at higher risk.
AI Analysis
Technical Summary
CVE-2025-0682 is a Local File Inclusion vulnerability classified under CWE-98, found in the ThemeREX Addons plugin for WordPress, affecting all versions up to and including 2.33.0. The flaw exists in the handling of the 'type' attribute within the 'trx_sc_reviews' shortcode, where the plugin fails to properly validate or sanitize the filename input used in include or require PHP statements. This improper control allows authenticated users with contributor-level or higher permissions to manipulate the filename parameter to include arbitrary files from the server. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or misconfigurations), they can include and execute these files remotely, leading to full remote code execution on the web server. The vulnerability does not require user interaction but does require authentication with contributor or higher privileges, which are commonly granted in many WordPress sites for content creation. The CVSS 3.1 score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the potential for exploitation is significant given the widespread use of WordPress and ThemeREX Addons. The vulnerability enables attackers to bypass access controls, execute arbitrary PHP code, and potentially take over the affected website and underlying server infrastructure.
Potential Impact
The impact of CVE-2025-0682 is severe for organizations using the ThemeREX Addons plugin on WordPress sites. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code with the privileges of the web server user. This can result in full site compromise, data theft, defacement, installation of backdoors, or pivoting to internal networks. Confidential information stored or processed by the website can be exposed or altered, and availability can be disrupted by malicious actions such as deleting files or launching denial-of-service conditions. Since the vulnerability requires only contributor-level authentication, it lowers the barrier for exploitation in environments where contributors are common, increasing the risk. The widespread use of WordPress globally, including in e-commerce, government, and enterprise websites, amplifies the potential impact. Additionally, attackers could leverage this vulnerability to establish persistent access or use compromised servers as part of larger botnets or attack campaigns.
Mitigation Recommendations
To mitigate CVE-2025-0682, organizations should immediately update the ThemeREX Addons plugin to a patched version once available. Until a patch is released, implement the following specific measures: 1) Restrict contributor and higher-level user permissions to trusted individuals only, minimizing the risk of malicious exploitation. 2) Disable or remove the 'trx_sc_reviews' shortcode or any functionality that uses the vulnerable 'type' attribute to prevent exploitation. 3) Harden file upload mechanisms across the WordPress site to prevent uploading of executable PHP files, including strict MIME type and extension checks, and disabling PHP execution in upload directories. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit the inclusion vulnerability. 5) Monitor server and application logs for unusual file inclusion attempts or suspicious activity related to shortcode usage. 6) Conduct regular security audits and vulnerability scans focusing on WordPress plugins and user permissions. 7) Implement least privilege principles for all WordPress roles and consider additional authentication controls such as multi-factor authentication for contributors and above.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain, South Africa, Russia, South Korea
CVE-2025-0682: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeREX Addons
Description
CVE-2025-0682 is a high-severity Local File Inclusion (LFI) vulnerability in the ThemeREX Addons WordPress plugin, affecting all versions up to 2. 33. 0. It arises from improper control of the filename in the 'trx_sc_reviews' shortcode's 'type' attribute, allowing authenticated users with contributor-level or higher permissions to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability requires no user interaction but does require authentication with contributor or higher privileges. Although no known exploits are currently in the wild, the CVSS score of 8. 8 reflects the high impact and ease of exploitation. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential compromise. Countries with significant WordPress usage and active web development communities are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-0682 is a Local File Inclusion vulnerability classified under CWE-98, found in the ThemeREX Addons plugin for WordPress, affecting all versions up to and including 2.33.0. The flaw exists in the handling of the 'type' attribute within the 'trx_sc_reviews' shortcode, where the plugin fails to properly validate or sanitize the filename input used in include or require PHP statements. This improper control allows authenticated users with contributor-level or higher permissions to manipulate the filename parameter to include arbitrary files from the server. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or misconfigurations), they can include and execute these files remotely, leading to full remote code execution on the web server. The vulnerability does not require user interaction but does require authentication with contributor or higher privileges, which are commonly granted in many WordPress sites for content creation. The CVSS 3.1 score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the potential for exploitation is significant given the widespread use of WordPress and ThemeREX Addons. The vulnerability enables attackers to bypass access controls, execute arbitrary PHP code, and potentially take over the affected website and underlying server infrastructure.
Potential Impact
The impact of CVE-2025-0682 is severe for organizations using the ThemeREX Addons plugin on WordPress sites. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code with the privileges of the web server user. This can result in full site compromise, data theft, defacement, installation of backdoors, or pivoting to internal networks. Confidential information stored or processed by the website can be exposed or altered, and availability can be disrupted by malicious actions such as deleting files or launching denial-of-service conditions. Since the vulnerability requires only contributor-level authentication, it lowers the barrier for exploitation in environments where contributors are common, increasing the risk. The widespread use of WordPress globally, including in e-commerce, government, and enterprise websites, amplifies the potential impact. Additionally, attackers could leverage this vulnerability to establish persistent access or use compromised servers as part of larger botnets or attack campaigns.
Mitigation Recommendations
To mitigate CVE-2025-0682, organizations should immediately update the ThemeREX Addons plugin to a patched version once available. Until a patch is released, implement the following specific measures: 1) Restrict contributor and higher-level user permissions to trusted individuals only, minimizing the risk of malicious exploitation. 2) Disable or remove the 'trx_sc_reviews' shortcode or any functionality that uses the vulnerable 'type' attribute to prevent exploitation. 3) Harden file upload mechanisms across the WordPress site to prevent uploading of executable PHP files, including strict MIME type and extension checks, and disabling PHP execution in upload directories. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit the inclusion vulnerability. 5) Monitor server and application logs for unusual file inclusion attempts or suspicious activity related to shortcode usage. 6) Conduct regular security audits and vulnerability scans focusing on WordPress plugins and user permissions. 7) Implement least privilege principles for all WordPress roles and consider additional authentication controls such as multi-factor authentication for contributors and above.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T17:22:10.767Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b6bb7ef31ef0b555383
Added to database: 2/25/2026, 9:36:43 PM
Last enriched: 2/25/2026, 11:53:56 PM
Last updated: 2/26/2026, 9:24:05 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.