Skip to main content

CVE-2025-4200: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in BZOTheme Zagg - Electronics & Accessories WooCommerce WordPress Theme

High
VulnerabilityCVE-2025-4200cvecve-2025-4200cwe-98
Published: Sat Jun 14 2025 (06/14/2025, 08:23:23 UTC)
Source: CVE Database V5
Vendor/Project: BZOTheme
Product: Zagg - Electronics & Accessories WooCommerce WordPress Theme

Description

The Zagg - Electronics & Accessories WooCommerce WordPress Theme theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.1 via the load_view() function that is called via at least three AJAX actions: 'load_more_post', 'load_shop', and 'load_more_product. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

AI-Powered Analysis

AILast updated: 06/14/2025, 08:49:38 UTC

Technical Analysis

CVE-2025-4200 is a high-severity vulnerability affecting the Zagg - Electronics & Accessories WooCommerce WordPress Theme, developed by BZOTheme. This vulnerability is classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP programs, commonly known as a Remote File Inclusion (RFI) or Local File Inclusion (LFI) vulnerability. Specifically, the flaw exists in the load_view() function of the theme, which is invoked through at least three AJAX actions: 'load_more_post', 'load_shop', and 'load_more_product'. The vulnerability allows unauthenticated attackers to manipulate the filename parameter used in PHP include/require statements, enabling them to include arbitrary files on the server. This can lead to the execution of arbitrary PHP code if attackers manage to upload malicious files disguised as images or other safe file types, or if they can reference existing files on the server. The exploitation does not require any authentication or user interaction, and the attack vector is network accessible (remote). The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality, integrity, and availability, although the attack complexity is high, indicating some difficulty in exploitation. The vulnerability affects all versions of the theme up to and including version 1.4.1. No official patches have been released at the time of this report, and no known exploits are currently observed in the wild. However, given the nature of the vulnerability, it poses a significant risk to websites using this theme, especially e-commerce sites relying on WooCommerce for electronics and accessories sales, where sensitive customer and transaction data may be at risk. Attackers exploiting this vulnerability could bypass access controls, execute arbitrary code, and potentially take full control of the affected web server environment.

Potential Impact

For European organizations, this vulnerability poses a substantial threat, particularly to e-commerce businesses and online retailers using WordPress with the Zagg WooCommerce theme. Successful exploitation could lead to unauthorized access to sensitive customer data, including personal information and payment details, violating GDPR and other data protection regulations. The ability to execute arbitrary code on the server could allow attackers to implant backdoors, deface websites, disrupt service availability, or use the compromised server as a pivot point for further attacks within the organization's network. This could result in financial losses, reputational damage, regulatory fines, and operational disruptions. Given the widespread use of WordPress and WooCommerce in Europe, especially among small and medium enterprises in the retail sector, the vulnerability could have broad implications. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the risk of automated exploitation attempts. The high attack complexity somewhat mitigates immediate mass exploitation but does not eliminate targeted attacks against high-value European organizations.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting the vulnerable AJAX actions ('load_more_post', 'load_shop', 'load_more_product') until a patch is available. This can be done by modifying the theme code or using WordPress hooks to prevent these actions from being called. 2. Implement strict input validation and sanitization on any parameters used in include or require statements within the theme, ensuring only allowed filenames or paths can be processed. 3. Restrict file upload types and enforce server-side validation to prevent uploading of executable PHP code disguised as images or other safe file types. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable AJAX endpoints. 5. Monitor web server logs for unusual access patterns or attempts to exploit the include functionality. 6. Isolate the WordPress environment using containerization or sandboxing to limit the impact of potential code execution. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Engage with the theme vendor (BZOTheme) to obtain patches or updates and apply them promptly once available. 9. Educate site administrators on the risks of using outdated themes and the importance of timely updates and security best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-01T13:41:23.492Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684d3416a8c9212743818ae7

Added to database: 6/14/2025, 8:34:30 AM

Last enriched: 6/14/2025, 8:49:38 AM

Last updated: 8/14/2025, 9:03:36 PM

Views: 41

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats