Plattform
wordpress
Komponente
hide-my-wp
Behoben in
5.4.02
CVE-2025-2056 describes a Path Traversal vulnerability discovered in the WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress. This flaw allows unauthenticated attackers to read arbitrary files on the server, potentially exposing sensitive data. The vulnerability affects versions from 0.0.0 up to and including 5.4.01. A patch is available in version 5.4.02.
The Path Traversal vulnerability in WP Ghost allows an attacker to bypass intended access restrictions and read arbitrary files on the server. This could expose sensitive data such as configuration files, database credentials, or even source code. Successful exploitation could lead to complete compromise of the WordPress installation and potentially the underlying server. The ability to read arbitrary files significantly expands the attack surface and increases the potential for data exfiltration and further malicious activity.
CVE-2025-2056 was publicly disclosed on 2025-03-14. No public proof-of-concept (POC) code has been observed at the time of writing. The vulnerability's relatively simple nature suggests that POCs could emerge quickly. The EPSS score is pending evaluation, but the ease of exploitation suggests a potential for medium probability of exploitation.
WordPress websites using the WP Ghost (Hide My WP Ghost) – Security & Firewall plugin, particularly those running versions 0.0.0 through 5.4.01, are at risk. Shared hosting environments where multiple WordPress installations share the same server resources are especially vulnerable, as a compromise of one site could potentially expose files on other sites.
• wordpress / composer / npm:
grep -r "showFile function" /var/www/html/wp-content/plugins/wp-ghost/• generic web:
curl -I 'https://your-wordpress-site.com/wp-content/plugins/wp-ghost/showFile?file=../../../../etc/passwd' # Attempt to access sensitive filedisclosure
Exploit-Status
EPSS
1.29% (80% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-2056 is to immediately upgrade the WP Ghost plugin to version 5.4.02 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious path traversal patterns (e.g., '../'). Restrict file permissions on the server to minimize the impact of potential file access. Regularly review WordPress plugin installations and remove any unused or outdated plugins.
Actualice el plugin WP Ghost (Hide My WP Ghost) – Security & Firewall a la versión 5.4.02 o superior para mitigar la vulnerabilidad de Path Traversal. Esta actualización corrige el problema permitiendo que el acceso a archivos esté restringido y evitando la lectura no autorizada de archivos sensibles.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-2056 is a Path Traversal vulnerability affecting the WP Ghost plugin for WordPress, allowing attackers to read sensitive files on the server.
You are affected if you are using WP Ghost plugin versions 0.0.0 through 5.4.01. Upgrade to 5.4.02 or later to resolve the issue.
Upgrade the WP Ghost plugin to version 5.4.02 or later. Consider temporary workarounds like restricting file access permissions if immediate upgrade is not possible.
As of the public disclosure date, there are no confirmed reports of active exploitation, but the vulnerability is publicly known.
Refer to the official WP Ghost plugin website or WordPress plugin repository for the latest advisory and update information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.