CVE-2025-2294
CRITICAL EXPLOITED NUCLEIKubio AI Page Builder <2.5.1 - Local File Inclusion
Title source: llmDescription
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Exploits (13)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/CVE-2025-2294-FileContains.py
github
WORKING POC
6 stars
by AikidoSec · javascriptpoc
https://github.com/AikidoSec/zen-0-days/tree/main/php/CVE-2025-2294
nomisec
WORKING POC
2 stars
by fumioryoto · remote
https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2025-2294
Nuclei Templates (1)
Kubio AI Page Builder <= 2.5.1 - Local File Inclusion
CRITICALVERIFIEDby s4e-io
FOFA:
body="wp-content/plugins/kubio/"
Scores
CVSS v3
9.8
EPSS
0.5465
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2025-03-27
Classification
CWE
CWE-22
Status
draft
Timeline
Published
Mar 28, 2025
Tracked Since
Feb 18, 2026