CVE-2025-60150
wpshuffle · wpshuffle Subscribe Multiple Products
A high-severity vulnerability has been identified in multiple wpshuffle Subscribe products, which could allow an unauthenticated attacker to read sensitive files on the web server.
Executive summary
A high-severity vulnerability has been identified in multiple wpshuffle Subscribe products, which could allow an unauthenticated attacker to read sensitive files on the web server. Successful exploitation could lead to the exposure of confidential data, such as system configurations and user credentials, providing a foothold for further attacks. Organizations are urged to apply the vendor-supplied security patches immediately to mitigate this risk.
Vulnerability
This vulnerability is a Local File Inclusion (LFI) flaw, categorized as an Improper Control of Filename for an Include/Require Statement. The application fails to properly sanitize user-supplied input that is used to construct a file path. An attacker can manipulate this input to include and display the contents of arbitrary files from the server's local file system, such as /etc/passwd or application configuration files containing database credentials.
Business impact
This is a high-severity vulnerability with a CVSS score of 7.5. Exploitation can lead to significant business impact, including the unauthorized disclosure of sensitive information, such as intellectual property, customer data, and system credentials. This data breach could result in regulatory fines, reputational damage, and a loss of customer trust. Furthermore, the information obtained through this vulnerability could be used by an attacker to facilitate lateral movement and escalate their privileges within the corporate network.
Remediation
Immediate Action: Apply vendor security updates immediately across all affected instances of wpshuffle Subscribe products. After patching, it is crucial to monitor for any ongoing or past exploitation attempts by thoroughly reviewing web server and application access logs for indicators of compromise.
Proactive Monitoring: Security teams should actively monitor for signs of LFI attacks. In web server logs, look for suspicious requests containing directory traversal sequences (../), absolute file paths (e.g., /etc/passwd), and PHP filter wrappers (php://filter). Monitor for unexpected file access patterns or outbound network connections from the affected servers.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block LFI and directory traversal attack patterns. Additionally, harden the server's file system permissions to restrict the web server process from accessing sensitive files and directories outside of the web root.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the high severity (CVSS 7.5) and the critical nature of Local File Inclusion vulnerabilities, which can lead to sensitive data exposure and further system compromise, immediate action is required. It is strongly recommended that organizations prioritize identifying all affected "wpshuffle Subscribe" products within their environment and apply the vendor-provided security updates without delay. While this vulnerability is not currently listed on the CISA KEV catalog, its high-impact potential warrants immediate attention to prevent potential exploitation.