Skip to main content

CVE-2025-32152: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Essential Plugins by WP OnlineSupport Slider a SlidersPack

High
VulnerabilityCVE-2025-32152cvecve-2025-32152cwe-98
Published: Fri Apr 04 2025 (04/04/2025, 15:58:38 UTC)
Source: CVE
Vendor/Project: Essential Plugins by WP OnlineSupport
Product: Slider a SlidersPack

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Essential Plugins by WP OnlineSupport Slider a SlidersPack allows PHP Local File Inclusion. This issue affects Slider a SlidersPack: from n/a through 2.3.

AI-Powered Analysis

AILast updated: 07/12/2025, 02:19:36 UTC

Technical Analysis

CVE-2025-32152 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the "Slider a SlidersPack" plugin, part of the Essential Plugins suite by WP OnlineSupport, up to version 2.3. The flaw allows an attacker to perform PHP Local File Inclusion (LFI), a type of vulnerability where the application improperly handles user-supplied input that determines which files are included or required by the PHP interpreter. This can lead to unauthorized disclosure of sensitive files, execution of arbitrary code, or even full system compromise depending on the context and server configuration. The CVSS v3.1 base score is 7.5, indicating a high severity level. The vector string (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network, requires low privileges, no user interaction, and can impact confidentiality, integrity, and availability significantly. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for websites using this plugin. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation and monitoring. The vulnerability arises from insufficient validation or sanitization of the filename parameter used in PHP include/require statements, allowing attackers to manipulate the file path to include unintended local files. This can expose configuration files, source code, or other sensitive data, and potentially allow code execution if the attacker can control the contents of included files. Given the plugin's role in managing sliders on WordPress sites, this vulnerability could be exploited to compromise the underlying web server hosting the affected WordPress installation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites that use the Slider a SlidersPack plugin. Exploitation could lead to unauthorized access to sensitive data, including customer information, internal documents, or credentials stored on the server. The ability to execute arbitrary code or disrupt service availability can result in website defacement, data breaches, or denial of service, damaging organizational reputation and potentially violating GDPR and other data protection regulations. Since many European businesses use WordPress for their web presence, the attack surface is considerable. Additionally, sectors such as finance, healthcare, and government, which often have strict compliance requirements, could face severe regulatory and financial consequences if compromised. The vulnerability's remote exploitability without user interaction increases the risk of automated attacks or targeted campaigns. The lack of a current patch means organizations must rely on alternative mitigations until an official update is released. This situation demands immediate attention to prevent exploitation, especially given the potential for cascading impacts on confidentiality, integrity, and availability of critical web services.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the Slider a SlidersPack plugin until a security patch is available. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as those containing directory traversal patterns or unexpected file paths in parameters. 3. Restrict PHP include paths and disable allow_url_include in the PHP configuration to reduce the risk of remote file inclusion. 4. Conduct thorough input validation and sanitization on all user-supplied inputs, especially those influencing file paths, to ensure only expected and safe filenames are processed. 5. Monitor web server logs for unusual access patterns or errors indicative of attempted exploitation. 6. Keep all WordPress core, themes, and plugins updated and subscribe to vendor security advisories for timely patch releases. 7. Employ the principle of least privilege for web server processes to limit the impact of a potential compromise. 8. Consider deploying runtime application self-protection (RASP) tools that can detect and block exploitation attempts in real time. 9. Prepare incident response plans specific to web application compromises to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-04T10:00:58.027Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd672c

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 2:19:36 AM

Last updated: 7/28/2025, 6:21:54 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats