First published: Fri Mar 28 2025(Updated: )
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ExtendThemes Kubio AI Page Builder | <=2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2294 is considered a high severity vulnerability due to its potential for remote code execution through local file inclusion.
To fix CVE-2025-2294, update the Kubio AI Page Builder plugin to version 2.5.2 or later.
Any user of the Kubio AI Page Builder plugin for WordPress running version 2.5.1 or earlier is affected by CVE-2025-2294.
CVE-2025-2294 allows unauthenticated attackers to exploit local file inclusion to execute arbitrary files on the server.
CVE-2025-2294 was disclosed in early 2025, highlighting vulnerabilities in the Kubio AI Page Builder plugin.