ShopLentor WordPress Plugin CVE-2025-12493 Local File Inclusion: Brief Summary and Technical Details

A brief summary of CVE-2025-12493, a critical Local File Inclusion vulnerability in ShopLentor for WordPress up to version 3.2.5. This post covers technical details, affected versions, and vendor security history based on public sources.
CVE Analysis

7 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-11-04

ShopLentor WordPress Plugin CVE-2025-12493 Local File Inclusion: Brief Summary and Technical Details
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Attackers can execute arbitrary PHP code and access sensitive files on over 100,000 WordPress sites using ShopLentor due to a critical Local File Inclusion flaw. This vulnerability allows unauthenticated users to compromise e-commerce stores, potentially leading to data theft or full site takeover.

ShopLentor (formerly WooLentor) is a major WordPress plugin that integrates WooCommerce with Elementor and Gutenberg page builders. With millions of downloads and a large active user base, it is a key component in the WordPress e-commerce ecosystem.

Technical Information

CVE-2025-12493 is a Local File Inclusion (LFI) vulnerability in ShopLentor for WordPress, affecting all versions up to and including 3.2.5. The flaw resides in the load_template function, which does not properly sanitize user-supplied input for file paths. This allows attackers to use directory traversal sequences (such as ../) to include arbitrary files from the server's filesystem.

The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). Attackers can exploit this by sending crafted requests to endpoints that invoke the vulnerable function, referencing files like wp-config.php or any PHP file they can upload or access. If successful, this can result in disclosure of sensitive information or remote code execution if a malicious PHP file is included.

No public code snippets or proof of concept have been released for this vulnerability. The root cause is improper input validation in the file path parameter handled by the load_template function. The attack does not require authentication, increasing the risk and potential impact.

Affected Systems and Versions

  • Product: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules (formerly WooLentor)
  • Affected Versions: All versions up to and including 3.2.5
  • Vulnerable Configuration: Any WordPress installation with a vulnerable version of ShopLentor active

Vendor Security History

ShopLentor has a history of security issues, primarily Cross-Site Scripting (XSS) vulnerabilities, documented by WPScan and Wordfence. The vendor has released patches for many previous issues, but the recurrence of input validation flaws suggests ongoing challenges in secure development practices. The transition from XSS to an unauthenticated LFI vulnerability in CVE-2025-12493 marks a significant escalation in risk.

References

Detect & fix
what others miss