添加自定义页面模板 <= 2.0.1 - 认证 (管理员+) PHP 代码注入导致远程代码执行
平台
wordpress
组件
add-custom-page-template
修复版本
2.0.2
CVE-2025-3491 describes a Remote Code Execution (RCE) vulnerability affecting the Add custom page template plugin for WordPress. This vulnerability stems from insufficient sanitization of user-supplied input, allowing authenticated administrators to execute arbitrary code on the server. The vulnerability impacts versions 0.0.0 through 2.0.1, and a patch is available in version 2.0.2.
检测此 CVE 是否影响你的项目
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
影响与攻击场景翻译中…
An attacker exploiting this vulnerability could gain complete control over the WordPress server. By injecting malicious PHP code through the 'acptvalidatesetting' function, an authenticated administrator could execute arbitrary commands, install malware, steal sensitive data, or even completely compromise the server. The potential impact extends to any data stored on the server, including user credentials, database information, and website content. This vulnerability shares similarities with other PHP code injection flaws, where improper input validation leads to code execution.
利用背景翻译中…
CVE-2025-3491 was publicly disclosed on 2025-04-26. No public proof-of-concept (PoC) code has been released at the time of writing, but the vulnerability's nature makes it likely that a PoC will emerge. The EPSS score is currently pending evaluation, but the RCE nature of the vulnerability suggests a potential for medium to high exploitation probability. It is not currently listed on the CISA KEV catalog.
哪些人处于风险中翻译中…
WordPress websites utilizing the Add custom page template plugin, particularly those with administrator accounts that have not been secured with strong passwords and multi-factor authentication, are at significant risk. Shared hosting environments where multiple websites share the same server are also at increased risk, as a compromise of one website could potentially lead to the compromise of others.
检测步骤翻译中…
• wordpress: Use wp-cli to check plugin version: wp plugin list --all | grep 'Add custom page template'. If the version is less than 2.0.2, the system is vulnerable.
• wordpress: Examine the plugin's code for the acptvalidatesetting function and look for instances where user input is not properly sanitized.
• generic web: Monitor access logs for requests containing suspicious PHP code in the 'template_name' parameter.
• generic web: Check WordPress error logs for PHP errors related to the plugin.
攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
1.88% (83% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 高 — 需要管理员或特权账户。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2025-3491 is to immediately upgrade the Add custom page template plugin to version 2.0.2 or later. If upgrading is not immediately feasible due to compatibility issues or testing requirements, consider temporarily restricting administrator access to the plugin's settings. Web application firewalls (WAFs) configured to detect and block PHP code injection attempts can provide an additional layer of protection. Monitor WordPress logs for suspicious activity, particularly related to the 'acptvalidatesetting' function. After upgrading, verify the fix by attempting to inject a simple PHP payload through the plugin's settings and confirming that it is properly sanitized.
修复方法翻译中…
Actualice el plugin 'Add custom page template' a la versión 2.0.2 o superior para mitigar la vulnerabilidad de inyección de código PHP. Asegúrese de realizar una copia de seguridad completa de su sitio web antes de actualizar cualquier plugin. Verifique que la actualización se haya realizado correctamente revisando los registros de errores de WordPress.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2025-3491 — RCE in Add custom page template WordPress Plugin?
CVE-2025-3491 is a Remote Code Execution vulnerability in the Add custom page template WordPress plugin, allowing authenticated admins to execute code due to insufficient input sanitization.
Am I affected by CVE-2025-3491 in Add custom page template WordPress Plugin?
You are affected if you are using the Add custom page template plugin in WordPress versions 0.0.0 through 2.0.1. Check your plugin version immediately.
How do I fix CVE-2025-3491 in Add custom page template WordPress Plugin?
Upgrade the Add custom page template plugin to version 2.0.2 or later to resolve the vulnerability. If immediate upgrade is not possible, restrict administrator access to the plugin's settings.
Is CVE-2025-3491 being actively exploited?
While no active exploitation has been confirmed, the RCE nature of the vulnerability makes it likely that exploitation attempts will occur. Monitor your systems closely.
Where can I find the official WordPress advisory for CVE-2025-3491?
Refer to the official WordPress security announcements and the Add custom page template plugin's website for updates and advisories related to CVE-2025-3491.