CVE-2025-12851: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wphocus My auctions allegro
The My auctions allegro plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.6.32 via the 'controller' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
AI Analysis
Technical Summary
CVE-2025-12851 is a Local File Inclusion vulnerability categorized under CWE-98, found in the 'My auctions allegro' WordPress plugin developed by wphocus. This vulnerability exists in all versions up to and including 3.6.32 and is exploitable via the 'controller' parameter. The flaw arises from improper control of filenames used in include or require statements, allowing an attacker to specify arbitrary files to be included and executed by the PHP interpreter. Since the vulnerability does not require authentication or user interaction, an unauthenticated attacker can remotely exploit it by crafting a specially designed HTTP request targeting the vulnerable parameter. Successful exploitation can lead to arbitrary PHP code execution on the server, enabling attackers to bypass access controls, read sensitive files, or fully compromise the web server. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and high attack complexity. No patches or known exploits are currently documented, but the risk remains significant due to the nature of the vulnerability and the widespread use of WordPress plugins in e-commerce and auction sites.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, particularly for those operating WordPress-based auction or e-commerce platforms using the 'My auctions allegro' plugin. Exploitation could lead to unauthorized access to sensitive customer data, financial information, and internal business logic, resulting in data breaches and reputational damage. The ability to execute arbitrary code on the server could allow attackers to deploy malware, establish persistent backdoors, or disrupt service availability, impacting business continuity. Given the high adoption of WordPress in Europe and the critical nature of e-commerce infrastructure, the vulnerability could affect a broad range of organizations, from small businesses to large enterprises. Regulatory frameworks such as GDPR impose strict data protection requirements, and exploitation leading to data leakage could result in significant legal and financial penalties. Additionally, the vulnerability could be leveraged in supply chain attacks or to pivot into internal networks, increasing the overall threat landscape.
Mitigation Recommendations
Immediate mitigation steps include updating the 'My auctions allegro' plugin to a patched version once available. If no patch exists, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict input validation and sanitization on all user-controllable parameters, especially those used in file inclusion functions. Deploy Web Application Firewalls (WAFs) with rules specifically designed to detect and block attempts to exploit LFI vulnerabilities, such as suspicious file path traversal or inclusion patterns targeting the 'controller' parameter. Conduct thorough code reviews and security audits of custom plugins or themes to identify similar vulnerabilities. Employ least privilege principles for web server file permissions to limit the impact of potential exploitation. Regularly monitor logs for unusual access patterns or error messages indicative of exploitation attempts. Finally, maintain an incident response plan to quickly address any detected compromise stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12851: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wphocus My auctions allegro
Description
The My auctions allegro plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.6.32 via the 'controller' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
AI-Powered Analysis
Technical Analysis
CVE-2025-12851 is a Local File Inclusion vulnerability categorized under CWE-98, found in the 'My auctions allegro' WordPress plugin developed by wphocus. This vulnerability exists in all versions up to and including 3.6.32 and is exploitable via the 'controller' parameter. The flaw arises from improper control of filenames used in include or require statements, allowing an attacker to specify arbitrary files to be included and executed by the PHP interpreter. Since the vulnerability does not require authentication or user interaction, an unauthenticated attacker can remotely exploit it by crafting a specially designed HTTP request targeting the vulnerable parameter. Successful exploitation can lead to arbitrary PHP code execution on the server, enabling attackers to bypass access controls, read sensitive files, or fully compromise the web server. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and high attack complexity. No patches or known exploits are currently documented, but the risk remains significant due to the nature of the vulnerability and the widespread use of WordPress plugins in e-commerce and auction sites.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, particularly for those operating WordPress-based auction or e-commerce platforms using the 'My auctions allegro' plugin. Exploitation could lead to unauthorized access to sensitive customer data, financial information, and internal business logic, resulting in data breaches and reputational damage. The ability to execute arbitrary code on the server could allow attackers to deploy malware, establish persistent backdoors, or disrupt service availability, impacting business continuity. Given the high adoption of WordPress in Europe and the critical nature of e-commerce infrastructure, the vulnerability could affect a broad range of organizations, from small businesses to large enterprises. Regulatory frameworks such as GDPR impose strict data protection requirements, and exploitation leading to data leakage could result in significant legal and financial penalties. Additionally, the vulnerability could be leveraged in supply chain attacks or to pivot into internal networks, increasing the overall threat landscape.
Mitigation Recommendations
Immediate mitigation steps include updating the 'My auctions allegro' plugin to a patched version once available. If no patch exists, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict input validation and sanitization on all user-controllable parameters, especially those used in file inclusion functions. Deploy Web Application Firewalls (WAFs) with rules specifically designed to detect and block attempts to exploit LFI vulnerabilities, such as suspicious file path traversal or inclusion patterns targeting the 'controller' parameter. Conduct thorough code reviews and security audits of custom plugins or themes to identify similar vulnerabilities. Employ least privilege principles for web server file permissions to limit the impact of potential exploitation. Regularly monitor logs for unusual access patterns or error messages indicative of exploitation attempts. Finally, maintain an incident response plan to quickly address any detected compromise stemming from this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T23:45:33.325Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6932a9b1f88dbe026c8e9fb0
Added to database: 12/5/2025, 9:45:21 AM
Last enriched: 12/12/2025, 10:48:22 AM
Last updated: 1/19/2026, 8:46:58 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23852: CWE-94: Improper Control of Generation of Code ('Code Injection') in siyuan-note siyuan
MediumCVE-2026-1174: Resource Consumption in birkir prime
MediumCVE-2026-23837: CWE-863: Incorrect Authorization in franklioxygen MyTube
CriticalCVE-2026-23851: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighCVE-2026-23850: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.