CVE-2025-52809
WordPress vulnerability analysis and mitigation

Overview

A Local File Inclusion vulnerability (CVE-2025-52809) was discovered in the WordPress National Weather Service Alerts plugin versions 1.3.5 and below. The vulnerability was initially reported by Nguyen Xuan Chien on May 19, 2025, and was publicly disclosed on June 23, 2025. This security flaw is classified as an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, which affects the plugin's file inclusion mechanisms (Patchstack Database).

Technical details

The vulnerability has been assigned a CVSS v3.1 score of 8.1 (High), with the following vector string: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program) and requires no authentication to exploit, making it particularly dangerous. The issue falls under the OWASP Top 10 category A3: Injection (Patchstack Database).

Impact

The vulnerability allows malicious actors to include and view local files from the target website. This could potentially expose sensitive information such as database credentials, leading to complete database compromise depending on the server configuration. The software is considered abandoned, having not received updates for over a year, which amplifies the security risk (Patchstack Database).

Mitigation and workarounds

As no official fix is available, website administrators are advised to remove and replace the plugin immediately. Patchstack has issued a virtual patch to mitigate the issue by blocking potential attacks until an official fix becomes available. It's important to note that merely deactivating the plugin does not remove the security threat unless a virtual patch is deployed (Patchstack Database).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13542CRITICAL9.8
  • designthemes-lms
NoYesDec 02, 2025
CVE-2025-13724HIGH7.5
  • vikrentcar
NoYesDec 02, 2025
CVE-2025-13731MEDIUM6.4
  • nexter-extension
NoYesDec 02, 2025
CVE-2025-12630MEDIUM4.9
  • upload-am-file-hosting-vpn
NoYesDec 02, 2025
CVE-2025-13090MEDIUM4.9
  • wpdirectorykit
NoYesDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management