Age Gate <= 3.5.3 - 'lang'パラメータを介した認証されていないローカル PHP ファイルインクルージョン
プラットフォーム
wordpress
コンポーネント
age-gate
修正版
3.5.4
CVE-2025-2505 describes a critical Local PHP File Inclusion (LFI) vulnerability discovered in the Age Gate plugin for WordPress. This flaw allows unauthenticated attackers to include and execute arbitrary PHP files on the server, potentially leading to complete system compromise. The vulnerability affects versions from 0.0.0 up to and including 3.5.3, and a patch is available in version 3.5.4.
このCVEがあなたのプロジェクトに影響するか確認
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。
影響と攻撃シナリオ翻訳中…
The impact of this vulnerability is severe. An attacker can leverage the 'lang' parameter to include and execute malicious PHP code. This could involve uploading a seemingly harmless file (like an image) and then including it via the LFI vulnerability. Successful exploitation allows attackers to bypass access controls, steal sensitive data stored on the server (database credentials, configuration files), and ultimately achieve remote code execution. The attacker effectively gains control over the WordPress instance and potentially the underlying server. This is akin to a remote code execution (RCE) vulnerability, albeit requiring local file upload as a prerequisite.
悪用の状況翻訳中…
This vulnerability was publicly disclosed on March 20, 2025. While no active exploitation campaigns have been publicly confirmed, the critical severity and ease of exploitation make it a high-priority target. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are likely to emerge, increasing the risk of widespread exploitation.
リスク対象者翻訳中…
WordPress websites utilizing the Age Gate plugin, particularly those running older versions (0.0.0–3.5.3), are at significant risk. Shared hosting environments are especially vulnerable as they often have limited access controls and a higher concentration of vulnerable plugins. Websites with lax file upload policies are also at increased risk.
検出手順翻訳中…
• wordpress / plugin:
wp plugin list | grep age-gate• wordpress / plugin: Check the plugin version using wp plugin list and verify it is below 3.5.4.
• wordpress / server: Examine WordPress access logs for requests containing suspicious 'lang' parameters, such as those attempting to include system files (e.g., /etc/passwd).
• wordpress / server: Monitor WordPress error logs for PHP inclusion errors related to the 'lang' parameter.
• generic web: Use curl to test the Age Gate endpoint with various 'lang' parameters to see if arbitrary file inclusion is possible. curl 'https://example.com/wp-content/plugins/age-gate/age-gate.php?lang=/etc/passwd'
攻撃タイムライン
- Disclosure
disclosure
脅威インテリジェンス
エクスプロイト状況
EPSS
2.01% (84% パーセンタイル)
CISA SSVC
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
- Attack Complexity
- 低 — 特別な条件不要。安定して悪用可能。
- Privileges Required
- なし — 認証不要。資格情報なしで悪用可能。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化なし — 影響は脆弱なコンポーネントのみ。
- Confidentiality
- 高 — 機密性の完全喪失。全データが読み取り可能。
- Integrity
- 高 — 任意のデータの書き込み・変更・削除が可能。
- Availability
- 高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。
影響を受けるソフトウェア
パッケージ情報
- アクティブインストール数
- 40K既知
- プラグイン評価
- 4.6
- WordPressが必要
- 6.0.0+
- 動作確認済みバージョン
- 6.8.5
- PHPが必要
- 7.4+
弱点分類 (CWE)
タイムライン
- 予約済み
- 公開日
- 更新日
- EPSS 更新日
緩和策と回避策翻訳中…
The primary mitigation is to immediately upgrade the Age Gate plugin to version 3.5.4 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily restricting file uploads to only explicitly allowed file types. Implement strict input validation on the 'lang' parameter to prevent malicious file inclusions. Web Application Firewalls (WAFs) configured to detect and block attempts to include arbitrary files can provide an additional layer of defense. Monitor WordPress logs for unusual file inclusion attempts, specifically targeting the 'lang' parameter. A YARA rule could be created to detect the presence of malicious PHP files uploaded via this vulnerability.
修正方法
Age Gateプラグインをバージョン3.5.4以降にアップデートすることで、PHPファイルインクルージョンの脆弱性を軽減してください。このアップデートは、'lang'パラメータの処理方法を修正し、任意のファイルのインクルージョンを防ぎます。
CVEセキュリティニュースレター
脆弱性分析と重要アラートをメールでお届けします。
よくある質問翻訳中…
What is CVE-2025-2505 — LFI in Age Gate WordPress Plugin?
CVE-2025-2505 is a critical Local PHP File Inclusion vulnerability affecting the Age Gate WordPress plugin, allowing attackers to execute arbitrary code.
Am I affected by CVE-2025-2505 in Age Gate WordPress Plugin?
You are affected if you are using Age Gate plugin versions 0.0.0 through 3.5.3. Check your plugin version immediately.
How do I fix CVE-2025-2505 in Age Gate WordPress Plugin?
Upgrade the Age Gate plugin to version 3.5.4 or later to resolve the vulnerability. Consider temporary mitigations if immediate upgrade is not possible.
Is CVE-2025-2505 being actively exploited?
While no active exploitation campaigns have been confirmed, the vulnerability's severity and ease of exploitation make it a high-priority target.
Where can I find the official Age Gate advisory for CVE-2025-2505?
Check the Age Gate plugin's official website or WordPress plugin repository for the latest advisory and update information.