CVE-2025-4414
BaseFortify
Publication date: 2025-07-04
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-98 | The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-4414 is a Local File Inclusion (LFI) vulnerability in the WordPress CMSMasters Content Composer plugin versions prior to 2.5.7. It allows unauthenticated attackers to include and display local files from the target website by exploiting improper control of filename for include/require statements in PHP. This can expose sensitive information such as database credentials and potentially lead to further attacks like database takeover. [1]
How can this vulnerability impact me? :
This vulnerability can have a severe impact as it allows attackers to access and display sensitive local files without authentication. This exposure can lead to leakage of critical information like database credentials and, depending on the website's configuration, may result in a complete database takeover. The vulnerability has a high CVSS score of 8.1, indicating a high risk of exploitation and serious consequences for affected systems. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves monitoring for exploitation attempts that try to include local files via the vulnerable CMSMasters Content Composer plugin. While specific commands are not provided, users are advised to perform server-side malware scanning and professional incident response to identify signs of compromise. Network monitoring for unusual HTTP requests targeting the plugin's include/require functionality may also help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the CMSMasters Content Composer plugin to version 2.5.7 or later, as this version contains the fix for the vulnerability. Until the update can be applied, applying the virtual patch (vPatch) provided by Patchstack can block exploitation attempts. Additionally, enabling automatic mitigation and auto-updates if available, and conducting professional incident response and server-side malware scanning if compromise is suspected, are recommended. [1]