First published: Thu Apr 24 2025(Updated: )
The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
The Wound WordPress theme | <=0.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2558 is rated as a high severity vulnerability due to its potential for unauthenticated Local File Inclusion (LFI) attacks.
To fix CVE-2025-2558, update the The Wound WordPress theme to a version beyond 0.0.1 that includes parameter validation.
CVE-2025-2558 allows unauthenticated users to download arbitrary files from your server, posing a serious security risk.
Anyone using The Wound WordPress theme version 0.0.1 or earlier is affected by CVE-2025-2558.
As of now, there are no confirmed reports of active exploitation specifically for CVE-2025-2558.