WordPress Kubio AI Page Builder Local File Inclusion (LFI) Vulnerability
漏洞信息
漏洞名称: WordPress Kubio AI Page Builder Local File Inclusion (LFI) Vulnerability
漏洞编号:
- CVE: CVE-2025-2294
漏洞类型: 文件包含
漏洞等级: 严重
漏洞描述: Kubio AI Page Builder是WordPress的一个插件,用于帮助用户通过AI技术快速构建和设计网页。它广泛应用于需要快速部署和设计网站的场景,尤其是那些缺乏专业网页设计知识的用户。该插件因其易用性和强大的功能而受到许多WordPress网站管理员的青睐。
该漏洞属于本地文件包含(LFI)类型,源于thekubio_hybrid_theme_load_template
函数未对用户输入进行充分验证,导致攻击者可以通过构造特殊的HTTP请求参数,包含并执行服务器上的任意文件。这种漏洞的根源在于对用户提供的文件路径参数缺乏严格的过滤和限制。
此漏洞的影响极为严重,攻击者无需认证即可利用此漏洞,可能导致敏感信息泄露(如读取/etc/passwd
文件)、绕过访问控制,甚至在特定条件下实现远程代码执行(如果攻击者能够上传恶意文件)。由于攻击复杂度低且影响范围广,该漏洞被评定为严重级别。攻击者可以利用此漏洞对目标网站进行自动化攻击,对网站的安全性和数据的机密性构成重大威胁。
产品厂商: WordPress
产品名称: Kubio AI Page Builder
影响版本: ≤ 2.5.1
来源: https://github.com/r0otk3r/CVE-2025-2294
类型: CVE-2025:github search
仓库文件
- README.md
- cve_2025_2294.py
来源概述
CVE-2025-2294 - WordPress Kubio AI Page Builder <= 2.5.1 - Local File Inclusion (LFI) Exploit
Overview
CVE-2025-2294 affects the Kubio AI Page Builder plugin for WordPress (versions up to and including 2.5.1). It suffers from an unauthenticated Local File Inclusion (LFI) vulnerability via the thekubio_hybrid_theme_load_template
function.
This vulnerability allows an attacker to include and execute arbitrary files on the vulnerable WordPress server, which can lead to:
- Bypassing access controls
- Reading sensitive server files
- Remote code execution (if attacker can upload malicious PHP files disguised as safe file types)
Vulnerability Details
- Vulnerability Type: Local File Inclusion (LFI)
- Affected Plugin: Kubio AI Page Builder
- Affected Versions: ≤ 2.5.1
- Attack Vector: Unauthenticated HTTP request with crafted parameters
- Exploitability: High
- CVSS Score: 9.8 (Critical) [CNA: Wordfence]
Exploit Script Description
This Python script sends specially crafted HTTP GET requests to the vulnerable WordPress site to verify if it is vulnerable to the LFI issue.
Features:
- Test a single URL or multiple targets from a file.
- Customizable payload for arbitrary file inclusion (default:
/etc/passwd
). - Save full response to file.
- Preview first N lines of the response for quick validation.
- Support for HTTP proxy.
- Check-only mode for vulnerability scanning without saving output.
Usage
1 |
|
Advanced example with custom payload, proxy, and longer preview:
1 |
|
Request/Response:
⚠️ Disclaimer
This tool is intended for authorized security testing and research purposes only. Unauthorized use against systems without permission is illegal and unethical.