The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 23 Jun 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared The Wound Project
The Wound Project the Wound
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:the_wound_project:the_wound:*:*:*:*:*:wordpress:*:*
Vendors & Products The Wound Project
The Wound Project the Wound

Thu, 24 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Apr 2025 06:15:00 +0000

Type Values Removed Values Added
Description The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server
Title The Wound <= 0.0.1 - Unauthenticated LFI
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-04-24T14:39:00.705Z

Reserved: 2025-03-20T12:14:00.549Z

Link: CVE-2025-2558

cve-icon Vulnrichment

Updated: 2025-04-24T14:38:47.216Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-24T06:15:45.800

Modified: 2025-06-23T15:17:34.443

Link: CVE-2025-2558

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.