All versions of the Kubio AI Page Builder plugin are affected by a
Local File Inclusion (LFI) vulnerability. This flaw allows attackers to manipulate file paths to gain access to sensitive server files, such as configuration files (wp-config.php) or log files.
Because this vulnerability can be triggered without authentication, attackers can exploit it
remotely to read system files, extract database credentials, or execute malicious scripts under specific server configurations. Sometimes, LFI can lead to
Remote Code Execution (RCE), especially when combined with other vulnerabilities.
The broad install base of Kubio AI Page Builder makes this flaw a
high-value target for automated attacks and botnets scanning WordPress ecosystems for weak points.
Vulnerability Type: Local File Inclusion (LFI)Affected Plugin: Kubio AI Page Builder CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCVSS Breakdown:- Exploitable over the network (e.g., internet)
- Low complexity, requires no special tricks
- No login or credentials are needed
- No user action is necessary (no clicking or input)
- Severe impact on data, control, and site uptime
This LFI vulnerability represents a high-risk vector that, if left unpatched, can completely compromise the WordPress site.