关联漏洞
标题:
WordPress plugin Kubio AI Page Builder 路径遍历漏洞
(CVE-2025-2294)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Kubio AI Page Builder 2.5.1及之前版本存在路径遍历漏洞,该漏洞源于kubio_hybrid_theme_load_template函数存在本地文件包含,可能导致未认证攻击者包含和执行任意文件。
介绍
# CVE-2025-2294 - WordPress Kubio AI Page Builder <= 2.5.1 - Local File Inclusion (LFI) Exploit
---
## Overview
**CVE-2025-2294** affects the **Kubio AI Page Builder** plugin for WordPress (versions up to and including 2.5.1). It suffers from an **unauthenticated Local File Inclusion (LFI)** vulnerability via the `thekubio_hybrid_theme_load_template` function.
This vulnerability allows an attacker to include and execute arbitrary files on the vulnerable WordPress server, which can lead to:
- Bypassing access controls
- Reading sensitive server files
- Remote code execution (if attacker can upload malicious PHP files disguised as safe file types)
---
## Vulnerability Details
- **Vulnerability Type:** Local File Inclusion (LFI)
- **Affected Plugin:** Kubio AI Page Builder
- **Affected Versions:** ≤ 2.5.1
- **Attack Vector:** Unauthenticated HTTP request with crafted parameters
- **Exploitability:** High
- **CVSS Score:** 9.8 (Critical) [CNA: Wordfence]
---
## Exploit Script Description
This Python script sends specially crafted HTTP GET requests to the vulnerable WordPress site to verify if it is vulnerable to the LFI issue.
### Features:
- Test a single URL or multiple targets from a file.
- Customizable payload for arbitrary file inclusion (default: `/etc/passwd`).
- Save full response to file.
- Preview first N lines of the response for quick validation.
- Support for HTTP proxy.
- Check-only mode for vulnerability scanning without saving output.
---
## Usage
```bash
usage: cve_2025_2294.py [-h] [--url URL] [--payload PAYLOAD] [--save SAVE]
[--lines LINES] [--timeout TIMEOUT] [--proxy PROXY]
[--check] [--list LIST]
CVE-2025-2294 LFI Exploit
optional arguments:
-h, --help show this help message and exit
--url URL Target URL (e.g., http://127.0.0.1:8080)
--payload PAYLOAD
LFI payload path (default: ../../../../../../../../etc/passwd)
--save SAVE Save full response to file (optional)
--lines LINES Number of preview lines (default: 10)
--timeout TIMEOUT
Request timeout in seconds (default: 10)
--proxy PROXY Proxy URL (e.g., http://127.0.0.1:8080)
--check Check vulnerability status only, no saving or preview
--list LIST Path to file with list of URLs to check one by one
```
### Advanced example with custom payload, proxy, and longer preview:
```bash
python3 cve_2025_2294.py --url "http://192.168.1.10" --save loot.txt --lines 20 --payload /etc/passwd --timeout 10 --proxy "http://127.0.0.1:8080"
```
<img width="1899" height="497" alt="Screenshot_2025-07-27_16_32_55" src="https://github.com/user-attachments/assets/dc8fde7d-1956-475d-a0dd-ee1ed65f76d5" />
Request/Response:
<img width="1920" height="672" alt="Screenshot_2025-07-28_02_22_52" src="https://github.com/user-attachments/assets/e262da56-6fbb-411a-9c65-30c75c3a235e" />
## ⚠️ Disclaimer
This tool is intended for authorized security testing and research purposes only. Unauthorized use against systems without permission is illegal and unethical.
---
## Official Channels
- [YouTube @rootctf](https://www.youtube.com/@rootctf)
- [X @r0otk3r](https://x.com/r0otk3r)
文件快照
[4.0K] /data/pocs/0d04a72f503161ab806f84806b2373111055168c
├── [4.1K] cve_2025_2294.py
└── [3.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。