<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2025-5804 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2025-5804/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2025-5804/feed.xml" rel="self" type="application/rss+xml"/><item><title>Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)</title><link>https://feed.craftedsignal.io/briefs/2026-04-case-theme-lfi/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-case-theme-lfi/</guid><description>CVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.</description><content:encoded><![CDATA[<p>A local file inclusion (LFI) vulnerability, identified as CVE-2025-5804, affects the Case Theme User WordPress plugin before version 1.0.4. The vulnerability stems from insufficient validation of filenames passed to PHP&rsquo;s <code>include</code> or <code>require</code> statements. This allows an unauthenticated attacker to potentially include arbitrary local files on the server hosting the WordPress instance. Successful exploitation could lead to sensitive information disclosure, arbitrary code execution, or denial of service. The vulnerability was reported and patched by Patchstack. Users of the Case Theme User plugin are advised to upgrade to version 1.0.4 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Case Theme User plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting a PHP file within the plugin that uses an <code>include</code> or <code>require</code> statement.</li>
<li>The attacker modifies a GET or POST parameter associated with the vulnerable <code>include</code> or <code>require</code> statement, injecting a path to a local file (e.g., <code>/etc/passwd</code>).</li>
<li>The web server processes the request, and the PHP interpreter attempts to include the file specified in the attacker-controlled parameter.</li>
<li>Due to the LFI vulnerability, the server includes the attacker-specified local file.</li>
<li>If the included file contains sensitive data, such as configuration files or credentials, the attacker can extract this information from the server&rsquo;s response.</li>
<li>In more advanced scenarios, the attacker might attempt to include PHP files containing malicious code, achieving remote code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-5804 can lead to a range of impacts, including sensitive information disclosure such as WordPress configuration files (wp-config.php), which contain database credentials. Arbitrary code execution is possible if the attacker can include a file containing malicious PHP code. This could allow the attacker to gain complete control of the WordPress site and the underlying server. The number of affected sites depends on the adoption rate of the vulnerable Case Theme User plugin, but given the widespread use of WordPress, the potential impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Case Theme User WordPress plugin to version 1.0.4 or later to patch CVE-2025-5804.</li>
<li>Deploy the Sigma rule <code>Detect Case Theme User LFI Attempt</code> to your SIEM to identify potential exploitation attempts based on suspicious file paths in HTTP requests.</li>
<li>Monitor web server logs for unusual file access patterns, particularly requests containing &ldquo;..&rdquo;, &ldquo;%2e%2e&rdquo;, or other directory traversal sequences, to catch LFI attempts (see log source <code>webserver</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>php</category><category>lfi</category><category>wordpress</category><category>cve-2025-5804</category></item></channel></rss>