CVE-2023-25995: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in choicehomemortgage AI Mortgage Calculator
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in choicehomemortgage AI Mortgage Calculator allows PHP Local File Inclusion. This issue affects AI Mortgage Calculator: from n/a through 1.0.1.
AI Analysis
Technical Summary
CVE-2023-25995 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the AI Mortgage Calculator product developed by choicehomemortgage, up to version 1.0.1. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP's include or require functions to load unintended files from the local server. This can lead to arbitrary code execution, disclosure of sensitive information, or complete system compromise. The vulnerability arises because the application does not properly validate or sanitize user-supplied input that determines which files are included. Although the CVSS vector indicates that exploitation requires network access (AV:N), a high attack complexity (AC:H), and low privileges (PR:L) without user interaction (UI:N), successful exploitation can result in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known public exploits have been reported yet, and no patches are currently available. The vulnerability was reserved in February 2023 and published in June 2025. Given the nature of the affected product—a mortgage calculator AI tool—this vulnerability could be leveraged to compromise web servers hosting the application, potentially exposing sensitive financial data or enabling attackers to pivot within the victim network.
Potential Impact
For European organizations, especially financial institutions, mortgage brokers, and real estate companies using the choicehomemortgage AI Mortgage Calculator, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, which is subject to strict data protection regulations such as GDPR. A successful attack could result in data breaches, financial fraud, reputational damage, and regulatory penalties. Additionally, attackers could use the vulnerability to execute arbitrary code on affected servers, potentially disrupting services or using the compromised systems as a foothold for further attacks within the organization’s network. Given the high confidentiality, integrity, and availability impacts, organizations relying on this software must consider the risk of operational disruption and loss of customer trust.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the AI Mortgage Calculator application to trusted internal networks or VPNs to reduce exposure to external attackers. 2) Implementing Web Application Firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities, such as suspicious URL parameters or directory traversal patterns. 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially those used in include/require statements, to prevent malicious file path injection. 4) Monitoring application logs for unusual file access patterns or errors indicative of attempted exploitation. 5) Isolating the application in a hardened environment with minimal privileges to limit the impact of potential compromise. 6) Planning for an urgent update or patch deployment once the vendor releases a fix. 7) Educating developers and administrators about secure coding practices related to file inclusion and PHP application security.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2023-25995: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in choicehomemortgage AI Mortgage Calculator
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in choicehomemortgage AI Mortgage Calculator allows PHP Local File Inclusion. This issue affects AI Mortgage Calculator: from n/a through 1.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2023-25995 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the AI Mortgage Calculator product developed by choicehomemortgage, up to version 1.0.1. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP's include or require functions to load unintended files from the local server. This can lead to arbitrary code execution, disclosure of sensitive information, or complete system compromise. The vulnerability arises because the application does not properly validate or sanitize user-supplied input that determines which files are included. Although the CVSS vector indicates that exploitation requires network access (AV:N), a high attack complexity (AC:H), and low privileges (PR:L) without user interaction (UI:N), successful exploitation can result in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known public exploits have been reported yet, and no patches are currently available. The vulnerability was reserved in February 2023 and published in June 2025. Given the nature of the affected product—a mortgage calculator AI tool—this vulnerability could be leveraged to compromise web servers hosting the application, potentially exposing sensitive financial data or enabling attackers to pivot within the victim network.
Potential Impact
For European organizations, especially financial institutions, mortgage brokers, and real estate companies using the choicehomemortgage AI Mortgage Calculator, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, which is subject to strict data protection regulations such as GDPR. A successful attack could result in data breaches, financial fraud, reputational damage, and regulatory penalties. Additionally, attackers could use the vulnerability to execute arbitrary code on affected servers, potentially disrupting services or using the compromised systems as a foothold for further attacks within the organization’s network. Given the high confidentiality, integrity, and availability impacts, organizations relying on this software must consider the risk of operational disruption and loss of customer trust.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the AI Mortgage Calculator application to trusted internal networks or VPNs to reduce exposure to external attackers. 2) Implementing Web Application Firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities, such as suspicious URL parameters or directory traversal patterns. 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially those used in include/require statements, to prevent malicious file path injection. 4) Monitoring application logs for unusual file access patterns or errors indicative of attempted exploitation. 5) Isolating the application in a hardened environment with minimal privileges to limit the impact of potential compromise. 6) Planning for an urgent update or patch deployment once the vendor releases a fix. 7) Educating developers and administrators about secure coding practices related to file inclusion and PHP application security.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2023-02-17T13:47:16.260Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842f14871f4d251b5c95e81
Added to database: 6/6/2025, 1:46:48 PM
Last enriched: 7/7/2025, 7:57:43 PM
Last updated: 8/18/2025, 11:29:58 PM
Views: 14
Related Threats
CVE-2025-9247: Stack-based Buffer Overflow in Linksys RE6250
HighRussian State Hackers Exploit 7-Year-Old Cisco Router Vulnerability
HighCVE-2025-54988: CWE-611 Improper Restriction of XML External Entity Reference in Apache Software Foundation Apache Tika PDF parser module
CriticalCVE-2025-9246: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9245: Stack-based Buffer Overflow in Linksys RE6250
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.