CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)
CVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.
A local file inclusion (LFI) vulnerability has been identified in the CactusThemes VideoPro WordPress theme. Assigned CVE-2025-58913, this vulnerability exists due to the improper handling of filenames passed to include or require statements within the PHP code of the theme. Specifically, versions of VideoPro from its initial release up to and including version 2.3.8.1 are affected. Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to further compromise. The vulnerability was reported by Patchstack. Defenders should prioritize patching or removing the vulnerable theme.
Attack Chain
- The attacker identifies a VideoPro installation running a vulnerable version (<= 2.3.8.1).
- The attacker crafts a malicious HTTP request targeting a PHP script within the VideoPro theme that uses
includeorrequirestatements. - The attacker injects a path traversal sequence (e.g.,
../../../../etc/passwd) into the filename parameter of the HTTP request. - The vulnerable PHP script, without proper sanitization of the filename, attempts to include the attacker-specified file.
- If successful, the contents of the file (e.g.,
/etc/passwd) are exposed within the web server’s response. - The attacker analyzes the exposed file contents for sensitive information such as user credentials or configuration details.
- The attacker uses the obtained information to further compromise the server or other related systems.
Impact
Successful exploitation of CVE-2025-58913 allows an attacker to read arbitrary files on the webserver hosting the vulnerable WordPress instance. This can lead to the exposure of sensitive data such as configuration files containing database credentials, WordPress salts, or even source code. If sensitive credentials are leaked, an attacker could pivot to other systems or gain administrative access to the WordPress site. The vulnerable VideoPro theme is used by an unknown number of WordPress websites, representing a significant attack surface.
Recommendation
- Upgrade the CactusThemes VideoPro theme to a patched version (later than 2.3.8.1) or remove the theme entirely from WordPress installations to remediate CVE-2025-58913.
- Deploy the Sigma rule “Detect VideoPro LFI Attempts via Path Traversal” to identify exploitation attempts against vulnerable VideoPro installations using path traversal sequences in URI queries.
- Monitor web server logs (category
webserver, productlinux) for suspicious requests containing path traversal sequences (e.g.,../,../../) in the URI query string, which may indicate LFI attempts.
Detection coverage 2
Detect VideoPro LFI Attempts via Path Traversal
highDetects potential Local File Inclusion (LFI) attempts against CactusThemes VideoPro WordPress theme by identifying path traversal sequences in URI queries.
Detect VideoPro LFI Attempts via PHP Wrapper
highDetects potential Local File Inclusion (LFI) attempts against CactusThemes VideoPro WordPress theme by identifying php wrapper in URI queries.
Detection queries are kept inside the platform. Get full rules →