Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-7634 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Local File Inclusion (LFI) via the `mode` parameter. πŸ“‰ **Consequences**: Attackers can read sensitive server files or potentially execute arbitrary code, compromising the entire WordPress site integrity.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-98 (Improper Control of Filename for Include/Require). The plugin fails to sanitize the `mode` input before including files, allowing path traversal attacks.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **WP Travel Engine – Tour Booking Plugin – Tour Operator Software**. πŸ“… **Version**: **6.6.7 and earlier**. 🏒 **Vendor**: wptravelengine.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Impact**: High Severity (CVSS 9.8). Hackers can achieve **Full System Compromise**. They can read sensitive data (C:H), modify site content (I:H), and disrupt service (A:H) without authentication.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. CVSS Vector `AV:N/AC:L/PR:N/UI:N` indicates it is Network-accessible, Low Complexity, and requires **No Privileges** or User Interaction. Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Exploit Status**: No public PoC/Exploit listed in the data (`pocs: []`). However, the vulnerability is well-documented in source code diffs, making it highly likely to be exploited soon.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for installed version **< 6.6.7**. Check if the plugin is active. Look for AJAX endpoints related to `LoadTripsHtml` or `FilterTripsHtml` that accept unsanitized `mode` parameters.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update the plugin to the latest version immediately. The vendor has acknowledged the issue via WordPress Trac and Wordfence advisories. Patching resolves the LFI flaw.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **deactivate and delete** the WP Travel Engine plugin. Alternatively, restrict access to WordPress AJAX endpoints via WAF rules blocking suspicious `mode` parameter values.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. With a CVSS score of 9.8 and no auth required, this is an immediate threat. Prioritize patching to prevent unauthorized access and data breaches.