Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12493: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in devitemsllc ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor)

0
Critical
VulnerabilityCVE-2025-12493cvecve-2025-12493cwe-22
Published: Tue Nov 04 2025 (11/04/2025, 11:19:27 UTC)
Source: CVE Database V5
Vendor/Project: devitemsllc
Product: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor)

Description

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.5 via the 'load_template' function. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

AI-Powered Analysis

AILast updated: 11/11/2025, 11:38:39 UTC

Technical Analysis

CVE-2025-12493 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, i.e., Path Traversal) found in the ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution WordPress plugin, formerly known as WooLentor. This vulnerability exists in all versions up to and including 3.2.5 and is exploitable via the 'load_template' function. The flaw allows unauthenticated attackers to perform Local File Inclusion (LFI) by manipulating the file path input to include arbitrary files on the server. Since the plugin loads PHP templates dynamically, an attacker can include and execute arbitrary PHP files if they can upload or otherwise place malicious PHP files on the server. This leads to remote code execution (RCE), enabling attackers to bypass access controls, steal sensitive data, modify site content, or disrupt service availability. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score is 9.8, reflecting the critical nature of this vulnerability with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the severity and ease of exploitation make this a high-priority threat. The vulnerability impacts WordPress sites using the affected plugin, which is popular among WooCommerce users for building e-commerce storefronts with Elementor and Gutenberg editors. Given the widespread use of WordPress and WooCommerce in Europe, this vulnerability poses a significant risk to online retailers and businesses relying on this plugin for their web presence.

Potential Impact

The impact of CVE-2025-12493 on European organizations can be severe. Exploitation can lead to full server compromise, allowing attackers to execute arbitrary PHP code, which can result in data breaches, theft of customer information, financial fraud, defacement of websites, and disruption of e-commerce operations. For businesses relying on WooCommerce and ShopLentor for their online storefronts, this can mean loss of revenue, damage to brand reputation, and potential regulatory penalties under GDPR due to exposure of personal data. The vulnerability's unauthenticated nature increases the risk of widespread exploitation, especially targeting small and medium-sized enterprises that may lack robust security monitoring. Additionally, attackers could leverage compromised servers as pivot points for further attacks within corporate networks. The availability of the affected plugin across many European WordPress sites amplifies the potential attack surface. The critical severity and ease of exploitation necessitate urgent remediation to prevent significant operational and financial impacts.

Mitigation Recommendations

To mitigate CVE-2025-12493, organizations should immediately update the ShopLentor plugin to a patched version once released by the vendor. Until a patch is available, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implement strict input validation and sanitization on any user-supplied file path parameters to prevent path traversal attempts. Restrict file upload functionality to disallow PHP or executable files, and enforce strong file type and content validation. Employ Web Application Firewalls (WAFs) with rules to detect and block path traversal and LFI attack patterns targeting the 'load_template' function. Regularly audit and monitor web server logs for suspicious file inclusion attempts or unexpected PHP file executions. Limit file system permissions for the web server user to prevent unauthorized file access or execution. Conduct thorough security assessments of WordPress environments, focusing on plugins and themes. Educate development and operations teams about secure coding practices related to file handling. Finally, maintain regular backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-29T20:10:08.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909e325e8d08963ed86c4fb

Added to database: 11/4/2025, 11:27:33 AM

Last enriched: 11/11/2025, 11:38:39 AM

Last updated: 12/19/2025, 12:11:24 AM

Views: 169

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats