平台
wordpress
组件
case-theme-user
修复版本
1.0.5
CVE-2025-5804 描述了 Case Theme User 组件中的一个安全漏洞,该漏洞源于对包含/require 语句的文件名控制不当,导致 PHP 本地文件包含 (Local File Inclusion)。攻击者可以利用此漏洞读取服务器上的任意文件,可能导致信息泄露。此漏洞影响 Case Theme User 版本 1.0.0 到 1.0.4。已发布修复版本 1.0.4。
The primary impact of this LFI vulnerability is the potential for remote code execution (RCE). By crafting malicious file inclusion requests, an attacker can include sensitive system files, configuration files, or even PHP scripts. Successful exploitation could allow an attacker to read sensitive data, modify application behavior, or gain complete control over the affected server. The attacker could potentially escalate privileges and move laterally within the network if the server has access to other resources. This vulnerability shares similarities with other LFI exploits where attackers leverage the ability to include arbitrary files to compromise the system.
CVE-2025-5804 was published on 2026-04-10. The vulnerability's severity is rated as HIGH with a CVSS score of 7.5. Currently, there are no publicly known Proof-of-Concept (POC) exploits. The EPSS score is pending evaluation. There are no indications of active exploitation campaigns targeting this vulnerability at this time. Refer to the NVD (National Vulnerability Database) for updates and further information.
漏洞利用状态
EPSS
0.07% (22% 百分位)
CISA SSVC
The recommended mitigation for CVE-2025-5804 is to immediately upgrade Case Theme User to version 1.0.4 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. These may include restricting file access permissions, implementing input validation to sanitize file paths, and configuring a Web Application Firewall (WAF) to block suspicious file inclusion attempts. Specifically, WAF rules should be configured to detect and block requests containing potentially malicious file paths. Monitor system logs for unusual file access patterns that might indicate exploitation attempts. After upgrading, confirm the fix by attempting a file inclusion request with a known malicious path; the request should be blocked or result in an error.
Actualice el plugin Case Theme User a una versión corregida (superior a 1.0.4) para mitigar la vulnerabilidad de inclusión de archivos locales. Verifique la fuente del plugin en wordpress.org para obtener la última versión. Considere implementar medidas de seguridad adicionales, como restringir el acceso a archivos sensibles.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2025-5804 是 Case Theme User 组件中的一个 PHP 本地文件包含漏洞,允许攻击者读取服务器上的文件。
如果您的系统运行 Case Theme User 版本 1.0.0 到 1.0.4,则可能受到影响。
升级到 Case Theme User 版本 1.0.4 或更高版本以修复此漏洞。
CVSS 向量
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。