The Edumall theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.2.4 via the 'template' parameter of the 'edumall_lazy_load_template' AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included.
Metrics
Affected Vendors & Products
References
History
Mon, 28 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 26 Apr 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Edumall theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.2.4 via the 'template' parameter of the 'edumall_lazy_load_template' AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. | |
Title | Edumall <= 4.2.4 - Unauthenticated Local File Inclusion | |
Weaknesses | CWE-98 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-04-26T08:23:20.508Z
Updated: 2025-04-28T15:34:23.704Z
Reserved: 2025-03-07T18:42:57.689Z
Link: CVE-2025-2101

Updated: 2025-04-28T13:39:46.194Z

Status : Awaiting Analysis
Published: 2025-04-26T09:15:19.440
Modified: 2025-04-29T13:52:10.697
Link: CVE-2025-2101

No data.