First published: Thu Mar 27 2025(Updated: )
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in magepeopleteam WpTravelly allows PHP Local File Inclusion. This issue affects WpTravelly: from n/a through 1.8.7.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WpTravelly | <=1.8.7 | |
WpTravelly Plugin | <=1.8.7 |
Update the WordPress WpTravelly plugin to the latest available version (at least 1.8.8).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30891 is categorized as a critical vulnerability due to its potential for local file inclusion, which can lead to unauthorized access to sensitive files.
To fix CVE-2025-30891, update the WpTravelly plugin to version 1.8.8 or later, which addresses this vulnerability.
CVE-2025-30891 affects MagePeople WpTravelly up to version 1.8.7 and the WordPress WpTravelly Plugin up to version 1.8.7.
If CVE-2025-30891 is exploited, an attacker could potentially gain access to the server's file system, leading to data breaches.
Yes, there is a patch available in the updated version of the WpTravelly plugin which resolves CVE-2025-30891.