CVE-2025-60126

PluginOps · PluginOps Testimonial Multiple Products

A high-severity vulnerability has been identified in multiple PluginOps Testimonial products, allowing for Local File Inclusion (LFI).

Executive summary

A high-severity vulnerability has been identified in multiple PluginOps Testimonial products, allowing for Local File Inclusion (LFI). An unauthenticated attacker could exploit this flaw to read sensitive files on the web server, such as configuration files containing credentials or system user information. This exposure of confidential data can lead to further, more severe attacks against the organization's infrastructure.

Vulnerability

The vulnerability exists due to an improper control of filenames used in PHP's include or require statements within the Testimonial Slider plugin. An attacker can manipulate an input parameter, likely a URL parameter, to include directory traversal sequences (e.g., ../). This forces the application to read and display the contents of arbitrary files from the server's local filesystem, to which the web server process has access. Successful exploitation could allow an attacker to view sensitive files like wp-config.php, /etc/passwd, or other application source code and configuration files.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could lead to a significant data breach by exposing sensitive information, including database credentials, API keys, internal server paths, and other configuration details. This information could be leveraged by attackers to escalate privileges, gain unauthorized access to databases, or launch further attacks to achieve a full system compromise. The potential business impact includes reputational damage, financial loss from remediation efforts, and regulatory fines for non-compliance with data protection standards.

Remediation

Immediate Action: Organizations must immediately apply the security patches released by the vendor to all affected systems. After patching, it is crucial to review web server and application access logs for any signs of past or ongoing exploitation attempts targeting this vulnerability.

Proactive Monitoring: Security teams should monitor web server access logs for requests containing directory traversal patterns (e.g., ../, ..%2f) in URL parameters associated with the affected plugin. Monitor for anomalous read access to sensitive system files (e.g., wp-config.php, /etc/passwd, /etc/shadow) by the web server process. Network monitoring should be in place to detect any unusual outbound data transfers that could indicate data exfiltration.

Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to block Local File Inclusion and directory traversal attack patterns. Additionally, harden the server environment by enforcing strict file permissions to limit the web server's access to critical files and configure PHP's open_basedir directive to restrict the locations from which PHP can access files.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical risk of data exposure, this vulnerability requires immediate attention. We strongly recommend all organizations using the affected PluginOps products to apply the vendor-supplied security updates as their highest priority. Although not yet listed in the CISA KEV catalog, the severity and simplicity of exploitation make it a prime target for opportunistic attackers. Proactive patching is the most effective defense against potential compromise.