{"id":59603,"date":"2025-07-24T05:57:19","date_gmt":"2025-07-24T05:57:19","guid":{"rendered":""},"modified":"2025-08-08T17:09:06","modified_gmt":"2025-08-08T23:09:06","slug":"cve-2025-3740-critical-local-file-inclusion-vulnerability-in-school-management-system-for-wordpress-plugin","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-3740-critical-local-file-inclusion-vulnerability-in-school-management-system-for-wordpress-plugin\/","title":{"rendered":"<strong>CVE-2025-3740: Critical Local File Inclusion Vulnerability in School Management System for WordPress Plugin<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The CVE-2025-3740 vulnerability refers to a Local File Inclusion (LFI) flaw found in the School Management System for WordPress plugin. This vulnerability, which affects all versions up to and including 93.1.0, could potentially allow an authenticated attacker to execute arbitrary PHP code files on a server. This flaw is particularly concerning as it can be used to bypass access controls, gain sensitive data, or achieve <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-26074-remote-code-execution-vulnerability-in-orkes-conductor-v3-21-11\/\"  data-wpil-monitor-id=\"66031\">code execution<\/a> in cases where images and other \u201csafe\u201d file types can be uploaded and included. As a result, systems that use this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5835-droip-plugin-for-wordpress-unauthorized-access-and-modification-vulnerability\/\"  data-wpil-monitor-id=\"68988\">WordPress plugin<\/a> are at risk for data leakage or potential system compromise.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-3740<br \/>\nSeverity: Critical (CVSS: 8.8)<br \/>\nAttack Vector: Local<br \/>\nPrivileges Required: Subscriber-level access<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7027-critical-firmware-vulnerability-enabling-arbitrary-memory-writes-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"69445\">System compromise and potential<\/a> data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-329807129\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52187-critical-cross-site-scripting-xss-vulnerability-in-getprojectsidea-create-school-management-system-1-0\/\"  data-wpil-monitor-id=\"70199\">School Management System<\/a> for WordPress | Up to and including 93.1.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit takes advantage of a Local <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52808-a-critical-php-remote-file-inclusion-vulnerability-in-realtyelite\/\"  data-wpil-monitor-id=\"65864\">File Inclusion vulnerability<\/a> in the &#8216;page&#8217; parameter of the School Management System for WordPress plugin. An attacker with Subscriber-level access or above can include and execute <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7340-critical-arbitrary-file-upload-vulnerability-in-ht-contact-form-widget-for-wordpress\/\"  data-wpil-monitor-id=\"66377\">arbitrary files<\/a> on the server. This allows the execution of any <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52809-php-remote-file-inclusion-vulnerability-in-national-weather-service-alerts\/\"  data-wpil-monitor-id=\"65924\">PHP code in those files<\/a>, which can be used to bypass access controls or obtain sensitive data. In cases where images and other supposedly &#8220;safe&#8221; <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6058-critical-arbitrary-file-upload-vulnerability-in-wpbookit-wordpress-plugin\/\"  data-wpil-monitor-id=\"66464\">file types can be uploaded<\/a> and included, this exploit can also achieve code execution. This vulnerability can further be chained with other exploits to include various dashboard view <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6380-privilege-escalation-vulnerability-in-onlyoffice-docs-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"69244\">files<\/a> in the plugin, potentially leading to privilege escalation.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-168590185\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how the exploit might be triggered. This is a representation of a malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8243-critical-buffer-overflow-vulnerability-in-totolink-x15-http-post-request-handler\/\"  data-wpil-monitor-id=\"68990\">HTTP request<\/a> that an attacker could send.<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/wp-admin\/admin-ajax.php?action=sms_manage_page HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{ &quot;page&quot;: &quot;\/path\/to\/malicious\/file.php&quot; }<\/code><\/pre>\n<p>In the above example, the attacker is attempting to include a malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49416-critical-php-remote-file-inclusion-vulnerability-in-fastw3b-llc-fw-gallery\/\"  data-wpil-monitor-id=\"66030\">PHP file<\/a> located at &#8220;\/path\/to\/malicious\/file.php. If successful, this would allow the attacker to execute <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-25214-race-condition-vulnerability-in-wwbn-avideo-14-4-leading-to-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"68989\">arbitrary PHP code<\/a> on the server.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The CVE-2025-3740 vulnerability refers to a Local File Inclusion (LFI) flaw found in the School Management System for WordPress plugin. This vulnerability, which affects all versions up to and including 93.1.0, could potentially allow an authenticated attacker to execute arbitrary PHP code files on a server. This flaw is particularly concerning as it can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[76],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59603","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-privilege-escalation"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59603"}],"version-history":[{"count":9,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59603\/revisions"}],"predecessor-version":[{"id":63005,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59603\/revisions\/63005"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59603"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59603"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59603"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59603"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59603"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59603"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}