Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0682: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeREX Addons

0
High
VulnerabilityCVE-2025-0682cvecve-2025-0682cwe-98
Published: Sat Jan 25 2025 (01/25/2025, 05:30:06 UTC)
Source: CVE Database V5
Product: ThemeREX Addons

Description

CVE-2025-0682 is a high-severity Local File Inclusion (LFI) vulnerability in the ThemeREX Addons WordPress plugin, affecting all versions up to 2. 33. 0. It arises from improper control of the filename in the 'trx_sc_reviews' shortcode's 'type' attribute, allowing authenticated users with contributor-level or higher permissions to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability requires no user interaction but does require authentication with contributor or higher privileges. Although no known exploits are currently in the wild, the CVSS score of 8. 8 reflects the high impact and ease of exploitation. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential compromise. Countries with significant WordPress usage and active web development communities are at higher risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:53:56 UTC

Technical Analysis

CVE-2025-0682 is a Local File Inclusion vulnerability classified under CWE-98, found in the ThemeREX Addons plugin for WordPress, affecting all versions up to and including 2.33.0. The flaw exists in the handling of the 'type' attribute within the 'trx_sc_reviews' shortcode, where the plugin fails to properly validate or sanitize the filename input used in include or require PHP statements. This improper control allows authenticated users with contributor-level or higher permissions to manipulate the filename parameter to include arbitrary files from the server. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or misconfigurations), they can include and execute these files remotely, leading to full remote code execution on the web server. The vulnerability does not require user interaction but does require authentication with contributor or higher privileges, which are commonly granted in many WordPress sites for content creation. The CVSS 3.1 score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the potential for exploitation is significant given the widespread use of WordPress and ThemeREX Addons. The vulnerability enables attackers to bypass access controls, execute arbitrary PHP code, and potentially take over the affected website and underlying server infrastructure.

Potential Impact

The impact of CVE-2025-0682 is severe for organizations using the ThemeREX Addons plugin on WordPress sites. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code with the privileges of the web server user. This can result in full site compromise, data theft, defacement, installation of backdoors, or pivoting to internal networks. Confidential information stored or processed by the website can be exposed or altered, and availability can be disrupted by malicious actions such as deleting files or launching denial-of-service conditions. Since the vulnerability requires only contributor-level authentication, it lowers the barrier for exploitation in environments where contributors are common, increasing the risk. The widespread use of WordPress globally, including in e-commerce, government, and enterprise websites, amplifies the potential impact. Additionally, attackers could leverage this vulnerability to establish persistent access or use compromised servers as part of larger botnets or attack campaigns.

Mitigation Recommendations

To mitigate CVE-2025-0682, organizations should immediately update the ThemeREX Addons plugin to a patched version once available. Until a patch is released, implement the following specific measures: 1) Restrict contributor and higher-level user permissions to trusted individuals only, minimizing the risk of malicious exploitation. 2) Disable or remove the 'trx_sc_reviews' shortcode or any functionality that uses the vulnerable 'type' attribute to prevent exploitation. 3) Harden file upload mechanisms across the WordPress site to prevent uploading of executable PHP files, including strict MIME type and extension checks, and disabling PHP execution in upload directories. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit the inclusion vulnerability. 5) Monitor server and application logs for unusual file inclusion attempts or suspicious activity related to shortcode usage. 6) Conduct regular security audits and vulnerability scans focusing on WordPress plugins and user permissions. 7) Implement least privilege principles for all WordPress roles and consider additional authentication controls such as multi-factor authentication for contributors and above.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T17:22:10.767Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6bb7ef31ef0b555383

Added to database: 2/25/2026, 9:36:43 PM

Last enriched: 2/25/2026, 11:53:56 PM

Last updated: 2/26/2026, 9:24:05 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats