CVE-2025-2294

CRITICAL
2025-03-28 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 28, 2026 - 18:33 vuln.today
PoC Detected
Mar 28, 2025 - 18:11 vuln.today
Public exploit code
CVE Published
Mar 28, 2025 - 05:15 nvd
CRITICAL 9.8

Description

The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

Analysis

The Kubio AI Page Builder WordPress plugin through version 2.5.1 contains an unauthenticated Local File Inclusion via the kubio_hybrid_theme_load_template function. Attackers can include and execute arbitrary PHP files on the server, achieving remote code execution through techniques like PHP filter chains or log poisoning.

Technical Context

The kubio_hybrid_theme_load_template function accepts a template path parameter without proper validation. An unauthenticated attacker can traverse directories to include arbitrary PHP files. Using PHP filter chain techniques (php://filter/convert.base64-decode), the attacker can achieve code execution without requiring a pre-existing PHP file on the server.

Affected Products

['Kubio AI Page Builder <= 2.5.1']

Remediation

Update Kubio to version 2.5.2 or later. Implement strict template path validation using an allowlist. Deploy WAF rules detecting PHP filter chain patterns and path traversal.

Priority Score

126
Low Medium High Critical
KEV: 0
EPSS: +56.9
CVSS: +49
POC: +20

Share

CVE-2025-2294 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy