CVE-2025-10143: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in catchthemes Catch Dark Mode
The Catch Dark Mode plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0 via the 'catch_dark_mode' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI Analysis
Technical Summary
CVE-2025-10143 is a high-severity vulnerability affecting the Catch Dark Mode WordPress plugin developed by catchthemes. The flaw is classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP programs, commonly known as a Remote File Inclusion (RFI) or Local File Inclusion (LFI) vulnerability. Specifically, this vulnerability exists in all versions of the Catch Dark Mode plugin up to and including version 2.0, triggered via the 'catch_dark_mode' shortcode. An attacker with authenticated access at the Contributor level or higher can exploit this vulnerability to include arbitrary PHP files on the server. This inclusion allows execution of any PHP code contained in those files, effectively enabling remote code execution (RCE). The exploitation does not require user interaction but does require authenticated access with relatively low privileges (Contributor role), which is commonly granted to users who can upload content but not necessarily manage plugins or themes. The vulnerability arises because the plugin fails to properly validate or sanitize the filename parameter used in the include/require statement, allowing an attacker to manipulate the path to include malicious PHP files. This can lead to bypassing access controls, unauthorized data disclosure, and full system compromise if the attacker can upload PHP files (e.g., via other vulnerabilities or misconfigurations). The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low privileges required, no user interaction, and high impact on all security properties. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and thus poses a significant risk to affected WordPress sites using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially for those relying on WordPress websites with the Catch Dark Mode plugin installed. Exploitation can lead to unauthorized code execution on web servers, resulting in data breaches involving sensitive customer or business data, defacement of websites, or use of compromised servers as pivot points for further attacks within the corporate network. Given the Contributor-level access requirement, insider threats or compromised user accounts could be leveraged to exploit this flaw. The impact is particularly severe for organizations subject to GDPR and other data protection regulations, as breaches could lead to regulatory fines and reputational damage. Additionally, many European businesses use WordPress for e-commerce, marketing, and customer engagement, making availability and integrity critical. The ability to execute arbitrary PHP code could also facilitate the deployment of malware, ransomware, or web shells, further escalating the threat landscape. The lack of a patch at the time of disclosure increases the urgency for mitigation.
Mitigation Recommendations
1. Immediate mitigation should involve restricting Contributor-level user capabilities, ensuring that only trusted users have such access. 2. Disable or remove the Catch Dark Mode plugin until a security patch is released. 3. Implement strict file upload controls and scanning to prevent uploading of malicious PHP files that could be included. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious include/require patterns or attempts to exploit the shortcode parameter. 5. Monitor web server logs for unusual file inclusion attempts or unexpected PHP file executions. 6. Harden WordPress installations by enforcing the principle of least privilege, disabling PHP execution in upload directories, and regularly auditing user roles and permissions. 7. Once a patch is available, promptly apply updates to the plugin. 8. Consider using security plugins that detect and prevent LFI/RFI attacks. 9. Educate site administrators and content contributors about the risks of privilege misuse and suspicious activity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-10143: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in catchthemes Catch Dark Mode
Description
The Catch Dark Mode plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0 via the 'catch_dark_mode' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI-Powered Analysis
Technical Analysis
CVE-2025-10143 is a high-severity vulnerability affecting the Catch Dark Mode WordPress plugin developed by catchthemes. The flaw is classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP programs, commonly known as a Remote File Inclusion (RFI) or Local File Inclusion (LFI) vulnerability. Specifically, this vulnerability exists in all versions of the Catch Dark Mode plugin up to and including version 2.0, triggered via the 'catch_dark_mode' shortcode. An attacker with authenticated access at the Contributor level or higher can exploit this vulnerability to include arbitrary PHP files on the server. This inclusion allows execution of any PHP code contained in those files, effectively enabling remote code execution (RCE). The exploitation does not require user interaction but does require authenticated access with relatively low privileges (Contributor role), which is commonly granted to users who can upload content but not necessarily manage plugins or themes. The vulnerability arises because the plugin fails to properly validate or sanitize the filename parameter used in the include/require statement, allowing an attacker to manipulate the path to include malicious PHP files. This can lead to bypassing access controls, unauthorized data disclosure, and full system compromise if the attacker can upload PHP files (e.g., via other vulnerabilities or misconfigurations). The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low privileges required, no user interaction, and high impact on all security properties. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and thus poses a significant risk to affected WordPress sites using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially for those relying on WordPress websites with the Catch Dark Mode plugin installed. Exploitation can lead to unauthorized code execution on web servers, resulting in data breaches involving sensitive customer or business data, defacement of websites, or use of compromised servers as pivot points for further attacks within the corporate network. Given the Contributor-level access requirement, insider threats or compromised user accounts could be leveraged to exploit this flaw. The impact is particularly severe for organizations subject to GDPR and other data protection regulations, as breaches could lead to regulatory fines and reputational damage. Additionally, many European businesses use WordPress for e-commerce, marketing, and customer engagement, making availability and integrity critical. The ability to execute arbitrary PHP code could also facilitate the deployment of malware, ransomware, or web shells, further escalating the threat landscape. The lack of a patch at the time of disclosure increases the urgency for mitigation.
Mitigation Recommendations
1. Immediate mitigation should involve restricting Contributor-level user capabilities, ensuring that only trusted users have such access. 2. Disable or remove the Catch Dark Mode plugin until a security patch is released. 3. Implement strict file upload controls and scanning to prevent uploading of malicious PHP files that could be included. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious include/require patterns or attempts to exploit the shortcode parameter. 5. Monitor web server logs for unusual file inclusion attempts or unexpected PHP file executions. 6. Harden WordPress installations by enforcing the principle of least privilege, disabling PHP execution in upload directories, and regularly auditing user roles and permissions. 7. Once a patch is available, promptly apply updates to the plugin. 8. Consider using security plugins that detect and prevent LFI/RFI attacks. 9. Educate site administrators and content contributors about the risks of privilege misuse and suspicious activity.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-08T20:51:23.453Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ca1a3d571b2840ff0172de
Added to database: 9/17/2025, 2:17:33 AM
Last enriched: 9/17/2025, 2:32:30 AM
Last updated: 9/19/2025, 7:22:36 AM
Views: 10
Related Threats
CVE-2025-5955: CWE-288 Authentication Bypass Using an Alternate Path or Channel in aonetheme Service Finder SMS System
HighCVE-2025-10715: Improper Export of Android Application Components in APEUni PTE Exam Practice App
MediumCVE-2025-10712: SQL Injection in 07FLYCMS
MediumCVE-2025-10708: Path Traversal in Four-Faith Water Conservancy Informatization Platform
MediumCVE-2025-10707: Improper Authorization in JeecgBoot
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.