Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7634: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wptravelengine WP Travel Engine – Tour Booking Plugin – Tour Operator Software

0
Critical
VulnerabilityCVE-2025-7634cvecve-2025-7634cwe-98
Published: Thu Oct 09 2025 (10/09/2025, 05:23:53 UTC)
Source: CVE Database V5
Vendor/Project: wptravelengine
Product: WP Travel Engine – Tour Booking Plugin – Tour Operator Software

Description

CVE-2025-7634 is a critical Local File Inclusion (LFI) vulnerability in the WP Travel Engine WordPress plugin, affecting all versions up to 6. 6. 7. It allows unauthenticated attackers to manipulate the 'mode' parameter to include and execute arbitrary PHP files on the server. This can lead to full remote code execution, bypass of access controls, and exposure of sensitive data. The vulnerability has a CVSS score of 9. 8, indicating a severe risk with no authentication or user interaction required. Although no known exploits are currently in the wild, the ease of exploitation and potential impact make it a high priority for patching. European organizations using this plugin for tour booking or travel operations are at significant risk. Mitigation requires immediate plugin updates once available, restricting file upload capabilities, and implementing web application firewalls to detect suspicious requests.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:53:30 UTC

Technical Analysis

CVE-2025-7634 is a critical vulnerability classified as CWE-98 (Improper Control of Filename for Include/Require Statement) found in the WP Travel Engine – Tour Booking Plugin for WordPress, affecting all versions up to and including 6.6.7. The flaw resides in the handling of the 'mode' parameter, which can be manipulated by unauthenticated attackers to perform Local File Inclusion (LFI). This enables attackers to include arbitrary PHP files on the server, potentially executing malicious PHP code. The vulnerability does not require authentication or user interaction, making it highly exploitable remotely over the network. Exploitation can lead to full remote code execution, allowing attackers to bypass access controls, access sensitive data, or take over the affected web server. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. The plugin is widely used in the travel and tour booking sector, which often handles sensitive customer data and payment information, increasing the stakes of a successful attack. The vulnerability highlights the importance of secure input validation and proper control of file inclusion mechanisms in PHP applications.

Potential Impact

For European organizations, especially those in the travel and tourism sector using the WP Travel Engine plugin, this vulnerability poses a severe risk. Successful exploitation could lead to complete compromise of the web server hosting the plugin, resulting in data breaches involving personal customer information, financial data, and internal business information. This could cause significant reputational damage, regulatory penalties under GDPR for data protection failures, and operational disruption due to system downtime or defacement. Attackers could also use compromised servers as pivot points for further attacks within the corporate network. Given the criticality and ease of exploitation, organizations face a high risk of automated attacks and widespread exploitation attempts once proof-of-concept exploits become available. The impact extends beyond individual businesses to the broader tourism infrastructure, potentially affecting service availability and trust in online booking platforms.

Mitigation Recommendations

Immediate mitigation steps include monitoring for updates from the plugin vendor and applying patches as soon as they are released. Until patches are available, organizations should implement strict input validation and sanitization on the 'mode' parameter to prevent malicious file inclusion. Restrict file upload functionality to prevent uploading of executable PHP files, and enforce least privilege on web server file permissions to limit the impact of any successful inclusion. Deploy Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit LFI vulnerabilities, such as suspicious URL parameters or attempts to include local files. Conduct regular security audits and vulnerability scans focused on WordPress plugins and their configurations. Additionally, organizations should maintain robust backup and incident response plans to quickly recover from potential compromises. Educating developers and administrators about secure coding practices related to file inclusion is also recommended to prevent similar issues in custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-14T12:23:29.209Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e74b345132fb26fe2091fb

Added to database: 10/9/2025, 5:42:12 AM

Last enriched: 10/16/2025, 8:53:30 AM

Last updated: 11/22/2025, 10:27:24 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats