CVE-2025-13886: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in cvedovini LT Unleashed
The LT Unleashed plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.1 via the 'template' parameter in the `book` shortcode due to insufficient path sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where files such as wp-config.php can be included.
AI Analysis
Technical Summary
CVE-2025-13886 is a Local File Inclusion vulnerability classified under CWE-98, found in the LT Unleashed plugin for WordPress. The flaw exists in all versions up to and including 1.1.1, specifically in the handling of the 'template' parameter within the 'book' shortcode. Due to insufficient path sanitization, authenticated users with Contributor-level access or higher can manipulate this parameter to include arbitrary files from the server filesystem. This inclusion allows the execution of any PHP code contained within those files, effectively enabling remote code execution (RCE). The vulnerability can be exploited without user interaction once authenticated, but requires at least Contributor privileges, which are commonly assigned to trusted users or content creators. The exploitation can lead to bypassing WordPress access controls, exposure of sensitive configuration files such as wp-config.php, and full compromise of the hosting environment. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public patches or known exploits are currently documented, but the vulnerability's nature makes it a critical concern for affected sites.
Potential Impact
The impact of CVE-2025-13886 is substantial for organizations using the LT Unleashed WordPress plugin. Successful exploitation can lead to remote code execution on the web server, allowing attackers to execute arbitrary PHP code, which can result in full server compromise. This includes the ability to bypass WordPress access controls, escalate privileges, access sensitive data such as database credentials stored in wp-config.php, and potentially pivot to other internal systems. The availability of the website or application can also be disrupted by malicious code execution. Since the vulnerability requires only Contributor-level access, attackers who have obtained or compromised such accounts can leverage this flaw to escalate their privileges and control the server environment. This poses a significant risk to data confidentiality, integrity, and availability, potentially leading to data breaches, defacement, or service outages. Organizations relying on this plugin for content management or e-commerce should consider the risk of reputational damage, regulatory penalties, and operational disruption.
Mitigation Recommendations
To mitigate CVE-2025-13886, organizations should immediately update the LT Unleashed plugin to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level access to trusted users only and audit existing user roles for unnecessary privileges. Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'template' parameter can reduce exploitation risk. Additionally, disabling the vulnerable shortcode or removing the plugin temporarily can prevent attacks. Harden the server by restricting PHP file inclusion paths and disabling remote file inclusion in PHP configuration. Regularly monitor server logs for unusual file inclusion attempts or privilege escalations. Employ the principle of least privilege for WordPress roles and ensure strong authentication mechanisms are in place. Conduct security assessments and penetration testing focused on file inclusion vulnerabilities to identify residual risks. Finally, maintain regular backups and incident response plans to recover quickly if exploitation occurs.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-13886: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in cvedovini LT Unleashed
Description
The LT Unleashed plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.1 via the 'template' parameter in the `book` shortcode due to insufficient path sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where files such as wp-config.php can be included.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13886 is a Local File Inclusion vulnerability classified under CWE-98, found in the LT Unleashed plugin for WordPress. The flaw exists in all versions up to and including 1.1.1, specifically in the handling of the 'template' parameter within the 'book' shortcode. Due to insufficient path sanitization, authenticated users with Contributor-level access or higher can manipulate this parameter to include arbitrary files from the server filesystem. This inclusion allows the execution of any PHP code contained within those files, effectively enabling remote code execution (RCE). The vulnerability can be exploited without user interaction once authenticated, but requires at least Contributor privileges, which are commonly assigned to trusted users or content creators. The exploitation can lead to bypassing WordPress access controls, exposure of sensitive configuration files such as wp-config.php, and full compromise of the hosting environment. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public patches or known exploits are currently documented, but the vulnerability's nature makes it a critical concern for affected sites.
Potential Impact
The impact of CVE-2025-13886 is substantial for organizations using the LT Unleashed WordPress plugin. Successful exploitation can lead to remote code execution on the web server, allowing attackers to execute arbitrary PHP code, which can result in full server compromise. This includes the ability to bypass WordPress access controls, escalate privileges, access sensitive data such as database credentials stored in wp-config.php, and potentially pivot to other internal systems. The availability of the website or application can also be disrupted by malicious code execution. Since the vulnerability requires only Contributor-level access, attackers who have obtained or compromised such accounts can leverage this flaw to escalate their privileges and control the server environment. This poses a significant risk to data confidentiality, integrity, and availability, potentially leading to data breaches, defacement, or service outages. Organizations relying on this plugin for content management or e-commerce should consider the risk of reputational damage, regulatory penalties, and operational disruption.
Mitigation Recommendations
To mitigate CVE-2025-13886, organizations should immediately update the LT Unleashed plugin to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level access to trusted users only and audit existing user roles for unnecessary privileges. Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'template' parameter can reduce exploitation risk. Additionally, disabling the vulnerable shortcode or removing the plugin temporarily can prevent attacks. Harden the server by restricting PHP file inclusion paths and disabling remote file inclusion in PHP configuration. Regularly monitor server logs for unusual file inclusion attempts or privilege escalations. Employ the principle of least privilege for WordPress roles and ensure strong authentication mechanisms are in place. Conduct security assessments and penetration testing focused on file inclusion vulnerabilities to identify residual risks. Finally, maintain regular backups and incident response plans to recover quickly if exploitation occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T14:39:54.615Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b7fd3650da22753e7b18e
Added to database: 12/12/2025, 2:37:07 AM
Last enriched: 2/27/2026, 10:26:56 AM
Last updated: 3/24/2026, 12:18:29 AM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.