Cyber Posture

CVE-2025-7327

High

Published: 08 July 2025

Published
08 July 2025
Modified
09 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0093 76.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-7327 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Radiustheme Widget For Google Reviews. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 23.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the layout parameter to block directory traversal payloads, directly preventing inclusion and execution of arbitrary PHP files.

prevent

Directly remediates the directory traversal vulnerability by identifying, reporting, and patching the affected Widget for Google Reviews plugin versions up to 1.0.15.

prevent

Enforces least privilege to limit subscriber-level access, reducing the scope of exploitable resources and potential impact of PHP code execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Directory traversal in public-facing WordPress plugin directly enables remote PHP file inclusion and code execution (T1190); facilitates web shell deployment for persistent access and RCE (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Widget for Google Reviews plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.15 via the layout parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and…

more

execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This is limited to just PHP files.

Deeper analysisAI

CVE-2025-7327 is a directory traversal vulnerability in the Widget for Google Reviews plugin for WordPress, affecting all versions up to and including 1.0.15. The flaw exists in the handling of the "layout" parameter, which allows attackers to include and execute arbitrary PHP files on the server. Associated with CWE-98, it has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for remote exploitation with low privileges.

Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability over the network without user interaction. By manipulating the layout parameter, they can traverse directories to include arbitrary PHP files, enabling PHP code execution. This facilitates bypassing access controls, extracting sensitive data, or achieving remote code execution, particularly if PHP code is embedded in uploaded images or other "safe" file types, though exploitation is restricted to PHP files.

Mitigation details are outlined in the plugin's WordPress Trac changeset (from revision 3201057 to 3316262 in the business-reviews-wp trunk repository) and a Wordfence threat intelligence advisory, which likely include patches fixing the directory traversal issue in updated versions beyond 1.0.15. Security practitioners should update the plugin immediately and review access controls for low-privilege users.

Details

CWE(s)

Affected Products

radiustheme
widget for google reviews
≤ 1.0.16

CVEs Like This One

CVE-2025-58214Shared CWE-98
CVE-2025-54701Shared CWE-98
CVE-2026-27894Shared CWE-98
CVE-2024-51319Shared CWE-98
CVE-2025-49436Shared CWE-98
CVE-2025-69078Shared CWE-98
CVE-2026-27383Shared CWE-98
CVE-2026-24538Shared CWE-98
CVE-2025-58967Shared CWE-98
CVE-2025-0366Shared CWE-98

References