CVE-2023-25999: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in snstheme BodyCenter - Gym, Fitness WooCommerce WordPress Theme
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme BodyCenter - Gym, Fitness WooCommerce WordPress Theme allows PHP Local File Inclusion. This issue affects BodyCenter - Gym, Fitness WooCommerce WordPress Theme: from n/a through 2.4.
AI Analysis
Technical Summary
CVE-2023-25999 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP programs. Specifically, this vulnerability affects the 'BodyCenter - Gym, Fitness WooCommerce WordPress Theme' developed by snstheme. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the input to include arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information, code execution, or server compromise. The vulnerability is present in versions up to 2.4 of the theme, with no specific version exclusions noted. The CVSS 3.1 base score is 8.1, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network without authentication or user interaction, but requires high attack complexity. Successful exploitation impacts confidentiality, integrity, and availability severely. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk for websites using this theme. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability arises because the theme does not properly validate or sanitize user input controlling the filename in PHP include/require statements, allowing attackers to include unintended files from the server filesystem, potentially leading to remote code execution or data leakage.
Potential Impact
For European organizations, especially those operating e-commerce or fitness-related websites using WordPress with the BodyCenter theme, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, damaging customer trust and violating GDPR regulations. The integrity of the website content and backend systems could be compromised, enabling attackers to inject malicious code, deface websites, or pivot to internal networks. Availability could also be affected if attackers disrupt services or deploy ransomware. Given the widespread use of WordPress in Europe and the popularity of WooCommerce themes for online fitness businesses, the potential impact includes financial loss, reputational damage, and regulatory penalties. The high severity and remote exploitability without authentication make it a prime target for opportunistic attackers and advanced persistent threats focusing on European SMEs and enterprises in the health and fitness sector.
Mitigation Recommendations
Immediate mitigation steps include: 1) Temporarily disabling or removing the vulnerable BodyCenter theme until a patch is released. 2) Implementing Web Application Firewall (WAF) rules to detect and block attempts to exploit file inclusion vulnerabilities, specifically filtering requests with suspicious include parameters. 3) Restricting PHP include paths and disabling allow_url_include and allow_url_fopen directives in the PHP configuration to reduce the risk of remote file inclusion. 4) Conducting thorough input validation and sanitization on all user-supplied data controlling file inclusions, if custom modifications are possible. 5) Monitoring web server logs for unusual requests targeting include/require parameters. 6) Keeping WordPress core, plugins, and themes updated and subscribing to vendor security advisories for prompt patch application once available. 7) Employing principle of least privilege on the web server file system to limit the files accessible by the web application. 8) Regularly backing up website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2023-25999: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in snstheme BodyCenter - Gym, Fitness WooCommerce WordPress Theme
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme BodyCenter - Gym, Fitness WooCommerce WordPress Theme allows PHP Local File Inclusion. This issue affects BodyCenter - Gym, Fitness WooCommerce WordPress Theme: from n/a through 2.4.
AI-Powered Analysis
Technical Analysis
CVE-2023-25999 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP programs. Specifically, this vulnerability affects the 'BodyCenter - Gym, Fitness WooCommerce WordPress Theme' developed by snstheme. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the input to include arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information, code execution, or server compromise. The vulnerability is present in versions up to 2.4 of the theme, with no specific version exclusions noted. The CVSS 3.1 base score is 8.1, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network without authentication or user interaction, but requires high attack complexity. Successful exploitation impacts confidentiality, integrity, and availability severely. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk for websites using this theme. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability arises because the theme does not properly validate or sanitize user input controlling the filename in PHP include/require statements, allowing attackers to include unintended files from the server filesystem, potentially leading to remote code execution or data leakage.
Potential Impact
For European organizations, especially those operating e-commerce or fitness-related websites using WordPress with the BodyCenter theme, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, damaging customer trust and violating GDPR regulations. The integrity of the website content and backend systems could be compromised, enabling attackers to inject malicious code, deface websites, or pivot to internal networks. Availability could also be affected if attackers disrupt services or deploy ransomware. Given the widespread use of WordPress in Europe and the popularity of WooCommerce themes for online fitness businesses, the potential impact includes financial loss, reputational damage, and regulatory penalties. The high severity and remote exploitability without authentication make it a prime target for opportunistic attackers and advanced persistent threats focusing on European SMEs and enterprises in the health and fitness sector.
Mitigation Recommendations
Immediate mitigation steps include: 1) Temporarily disabling or removing the vulnerable BodyCenter theme until a patch is released. 2) Implementing Web Application Firewall (WAF) rules to detect and block attempts to exploit file inclusion vulnerabilities, specifically filtering requests with suspicious include parameters. 3) Restricting PHP include paths and disabling allow_url_include and allow_url_fopen directives in the PHP configuration to reduce the risk of remote file inclusion. 4) Conducting thorough input validation and sanitization on all user-supplied data controlling file inclusions, if custom modifications are possible. 5) Monitoring web server logs for unusual requests targeting include/require parameters. 6) Keeping WordPress core, plugins, and themes updated and subscribing to vendor security advisories for prompt patch application once available. 7) Employing principle of least privilege on the web server file system to limit the files accessible by the web application. 8) Regularly backing up website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2023-02-17T13:47:19.579Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f571b0bd07c3938a70f
Added to database: 6/10/2025, 6:54:15 PM
Last enriched: 7/11/2025, 2:46:11 AM
Last updated: 8/5/2025, 3:32:24 AM
Views: 15
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.