CVE-2025-11746: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 8theme XStore
The XStore theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.5.4 via theet_ajax_required_plugins_popup() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI Analysis
Technical Summary
CVE-2025-11746 is a path traversal vulnerability categorized under CWE-22, found in the 8theme XStore WordPress theme, versions up to and including 9.5.4. The vulnerability resides in the theet_ajax_required_plugins_popup() function, which improperly restricts pathname inputs, allowing an authenticated attacker with Subscriber-level privileges or higher to perform Local File Inclusion (LFI). This flaw enables the attacker to include arbitrary .php files from the server, leading to execution of arbitrary PHP code. Since WordPress roles such as Subscriber are often assigned to low-privilege users, this significantly lowers the bar for exploitation. The attacker can upload malicious PHP files (if upload functionality exists) and then include them via the vulnerable function, bypassing normal access controls. The vulnerability is remotely exploitable over the network without user interaction beyond authentication. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. No official patches or exploit code are currently publicly available, but the vulnerability is published and known to security researchers. The flaw can lead to full server compromise, data leakage, and persistent backdoors if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the XStore theme for e-commerce, corporate, or informational purposes. Exploitation can lead to unauthorized access to sensitive customer data, intellectual property, and internal systems. The ability to execute arbitrary PHP code can result in complete server takeover, enabling attackers to deploy ransomware, steal data, or pivot within the network. Given the widespread use of WordPress in Europe and the popularity of XStore among e-commerce sites, the potential impact includes financial loss, reputational damage, and regulatory penalties under GDPR for data breaches. Organizations with less mature patch management or those allowing subscriber-level registrations on public-facing sites are particularly vulnerable. The vulnerability could also be leveraged in supply chain attacks if attackers compromise theme installations used by multiple clients.
Mitigation Recommendations
Immediate mitigation involves updating the XStore theme to a patched version once released by 8theme. Until a patch is available, organizations should restrict subscriber-level user capabilities, disabling file upload functionalities if possible, and limit access to the vulnerable AJAX function via web application firewall (WAF) rules or custom code to validate and sanitize input parameters rigorously. Monitoring web server and application logs for unusual file inclusion attempts or unexpected PHP file uploads is critical. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions can help detect exploitation attempts. Additionally, organizations should review user roles and permissions to minimize the number of users with subscriber or higher privileges. Network segmentation and limiting public exposure of WordPress admin interfaces can reduce attack surface. Regular backups and incident response plans should be prepared in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-11746: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 8theme XStore
Description
The XStore theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.5.4 via theet_ajax_required_plugins_popup() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI-Powered Analysis
Technical Analysis
CVE-2025-11746 is a path traversal vulnerability categorized under CWE-22, found in the 8theme XStore WordPress theme, versions up to and including 9.5.4. The vulnerability resides in the theet_ajax_required_plugins_popup() function, which improperly restricts pathname inputs, allowing an authenticated attacker with Subscriber-level privileges or higher to perform Local File Inclusion (LFI). This flaw enables the attacker to include arbitrary .php files from the server, leading to execution of arbitrary PHP code. Since WordPress roles such as Subscriber are often assigned to low-privilege users, this significantly lowers the bar for exploitation. The attacker can upload malicious PHP files (if upload functionality exists) and then include them via the vulnerable function, bypassing normal access controls. The vulnerability is remotely exploitable over the network without user interaction beyond authentication. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. No official patches or exploit code are currently publicly available, but the vulnerability is published and known to security researchers. The flaw can lead to full server compromise, data leakage, and persistent backdoors if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the XStore theme for e-commerce, corporate, or informational purposes. Exploitation can lead to unauthorized access to sensitive customer data, intellectual property, and internal systems. The ability to execute arbitrary PHP code can result in complete server takeover, enabling attackers to deploy ransomware, steal data, or pivot within the network. Given the widespread use of WordPress in Europe and the popularity of XStore among e-commerce sites, the potential impact includes financial loss, reputational damage, and regulatory penalties under GDPR for data breaches. Organizations with less mature patch management or those allowing subscriber-level registrations on public-facing sites are particularly vulnerable. The vulnerability could also be leveraged in supply chain attacks if attackers compromise theme installations used by multiple clients.
Mitigation Recommendations
Immediate mitigation involves updating the XStore theme to a patched version once released by 8theme. Until a patch is available, organizations should restrict subscriber-level user capabilities, disabling file upload functionalities if possible, and limit access to the vulnerable AJAX function via web application firewall (WAF) rules or custom code to validate and sanitize input parameters rigorously. Monitoring web server and application logs for unusual file inclusion attempts or unexpected PHP file uploads is critical. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions can help detect exploitation attempts. Additionally, organizations should review user roles and permissions to minimize the number of users with subscriber or higher privileges. Network segmentation and limiting public exposure of WordPress admin interfaces can reduce attack surface. Regular backups and incident response plans should be prepared in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T14:23:56.888Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef0c4955734f1608eb63a9
Added to database: 10/15/2025, 2:51:53 AM
Last enriched: 10/15/2025, 3:06:49 AM
Last updated: 10/15/2025, 10:07:12 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
HighCVE-2025-9967: CWE-288 Authentication Bypass Using an Alternate Path or Channel in gsayed786 Orion SMS OTP Verification
CriticalCVE-2025-11728: CWE-306 Missing Authentication for Critical Function in oceanpayment Oceanpayment CreditCard Gateway
MediumCVE-2025-11722: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Woocommerce Category and Products Accordion Panel
HighCVE-2025-11701: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.