CVE-2025-13725 (CNNVD-202601-2933)
中文标题:
WordPress plugin Gutenberg Thim Blocks – Page Builder, Gutenberg Blocks for the Block Editor 路径遍历漏洞
英文标题:
Gutenberg Thim Blocks <= 1.0.1 - Authenticated (Contributor+) Arbitrary File Read via 'iconSVG' Parameter
漏洞描述
中文描述:
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Gutenberg Thim Blocks – Page Builder, Gutenberg Blocks for the Block Editor 1.0.1及之前版本存在路径遍历漏洞,该漏洞源于路径验证不足,可能导致经过身份验证的攻击者通过iconSVG参数读取服务器上的任意文件内容。
英文描述:
The Gutenberg Thim Blocks – Page Builder, Gutenberg Blocks for the Block Editor plugin for WordPress is vulnerable to arbitrary file reads in all versions up to, and including, 1.0.1. This is due to insufficient path validation in the server-side rendering of the thim-blocks/icon block. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server via the 'iconSVG' parameter, which can contain sensitive information such as wp-config.php.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| thimpress | Thim Blocks | - | ≤ 1.0.1 | - |
cpe:2.3:a:thimpress:thim_blocks:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-13725 |
2026-01-18 02:18:27 | 2026-01-18 06:00:43 |
| NVD | nvd_CVE-2025-13725 |
2026-01-18 03:00:07 | 2026-01-18 06:01:27 |
| CNNVD | cnnvd_CNNVD-202601-2933 |
2026-01-26 02:10:00 | 2026-01-25 18:11:52 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-202601-2933
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']