Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2025-30580 — AI Deep Analysis Summary

CVSS 10.0 · Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical **Code Injection** flaw in the DigiWidgets Image Editor plugin. <br>💥 **Consequences**: Attackers can achieve **Remote Code Execution (RCE)**.…

Q2Root Cause? (CWE/Flaw)

🛡️ **Root Cause**: **CWE-94** (Code Injection). <br>🔍 **Flaw**: Improper control of code generation. The plugin fails to sanitize inputs properly, allowing malicious code to be injected and executed by the server.

Q3Who is affected? (Versions/Components)

📦 **Affected Product**: WordPress Plugin **DigiWidgets Image Editor**. <br>🔢 **Versions**: Version **1.10 and earlier**. <br>👤 **Vendor**: kellydiek. <br>⚠️ **Note**: If you use this plugin, you are at risk.

Q4What can hackers do? (Privileges/Data)

🕵️ **Hacker Actions**: <br>1. **Execute Arbitrary Code**: Run PHP commands on the server. <br>2. **Full Access**: Gain admin-level privileges. <br>3.…

Q5Is exploitation threshold high? (Auth/Config)

🔓 **Exploitation Threshold**: **LOW**. <br>🌐 **Network**: Attack Vector is **Network (AV:N)**. <br>🔑 **Auth**: **No Authentication Required (PR:N)**. <br>👀 **User Interaction**: **None Required (UI:N)**.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

📜 **Public Exploit**: The provided data lists **no specific PoC (Proof of Concept)** in the `pocs` array. <br>🔗 **References**: Links to Patchstack indicate the vulnerability is tracked and recognized as an RCE issue.…

Q7How to self-check? (Features/Scanning)

🔍 **Self-Check Steps**: <br>1. **Scan Plugins**: Check your WordPress dashboard for **DigiWidgets Image Editor**. <br>2. **Version Check**: Verify if the installed version is **≤ 1.10**. <br>3.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: The description implies a fix is needed for versions **1.10 and earlier**. <br>📥 **Action**: Update the plugin to the **latest version** immediately.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: <br>1. **Deactivate**: Immediately disable the plugin if not in use. <br>2. **Delete**: Uninstall the plugin entirely if unnecessary. <br>3.…

Q10Is it urgent? (Priority Suggestion)

🔥 **Urgency**: **CRITICAL (Priority 1)**. <br>📉 **Risk**: CVSS **9.8** with **No Auth** required. <br>⏳ **Time**: Published April 1, 2025. <br>✅ **Recommendation**: Patch **IMMEDIATELY**.…