CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3DescriptionNVD
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Unfoldwp Magze allows PHP Local File Inclusion. This issue affects Magze: from n/a through 1.0.9.
AnalysisAI
PHP Local File Inclusion (LFI) vulnerability in Unfoldwp Magze versions up to 1.0.9 that allows unauthenticated remote attackers to include and execute arbitrary local files through improper control of filename parameters in PHP include/require statements. This is a network-accessible vulnerability with high attack complexity but complete impact on confidentiality, integrity, and availability (CVSS 8.1). The vulnerability likely affects WordPress plugin deployments where Magze is installed, and successful exploitation could lead to remote code execution through log poisoning or other LFI-to-RCE chains.
Technical ContextAI
This vulnerability exploits CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), a classic PHP web application flaw. The root cause is insufficient input validation and sanitization on user-supplied parameters that are directly passed to PHP include() or require() functions. Unlike Remote File Inclusion (RFI), LFI restricts file inclusion to files already present on the target server, but can still achieve code execution through: (1) log file poisoning (including Apache/Nginx access logs with PHP code), (2) session file manipulation, (3) temporary file exploitation, or (4) directory traversal to sensitive application files. Unfoldwp Magze (CPE likely wp-content/plugins/magze or similar WordPress plugin path) fails to implement a whitelist of allowed files or properly escape/validate the filename parameter before passing it to include/require statements, creating a direct path to local file access.
RemediationAI
Immediate actions: (1) Update Magze plugin to version 1.0.10 or later if available (check WordPress plugin repository or Unfoldwp website directly). (2) If no patch is available, disable or remove Magze until patched. (3) Temporary mitigation (if patching is delayed): Implement PHP-level restrictions via php.ini: set open_basedir to restrict file access, disable dangerous functions (include, require) if feasible, or use disable_functions directive to limit exploitation paths. (4) Web server level: Configure Apache/Nginx to prevent inclusion of sensitive files (e.g., deny access to /var/log, /proc). (5) Monitor access logs for patterns like '../', 'etc/passwd', or repeated failed includes. (6) Long-term: Unfoldwp must implement input validation (whitelist allowed filenames), use basename() to prevent directory traversal, and perform code review of all include/require statements. Contact Unfoldwp support for patch timeline and advisory if not publicly available.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17548