Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22279: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Crocoblock JetCompareWishlist

0
Unknown
VulnerabilityCVE-2025-22279cvecve-2025-22279
Published: Thu Apr 10 2025 (04/10/2025, 08:58:57 UTC)
Source: CVE Database V5
Vendor/Project: Crocoblock
Product: JetCompareWishlist

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Crocoblock JetCompareWishlist jet-compare-wishlist allows PHP Local File Inclusion.This issue affects JetCompareWishlist: from n/a through <= 1.5.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 02:42:44 UTC

Technical Analysis

CVE-2025-22279 identifies a Remote File Inclusion vulnerability in the Crocoblock JetCompareWishlist plugin for PHP, affecting versions up to 1.5.9. The root cause is improper validation and control over filenames used in PHP's include or require statements, which allows an attacker to specify arbitrary file paths. This flaw can be exploited remotely by sending crafted requests that manipulate the filename parameter, causing the application to include malicious code from external sources or local files. Such inclusion can lead to arbitrary code execution within the context of the web server, potentially compromising the entire system. The vulnerability is classified as a PHP Local File Inclusion (LFI) but may also enable Remote File Inclusion (RFI) depending on server configuration. No CVSS score has been assigned yet, and no public exploits are known. The vulnerability was reserved in early 2025 and published in April 2025. The affected product, JetCompareWishlist, is a plugin commonly used in WordPress environments to enhance e-commerce comparison features. The lack of patch links indicates that a fix may not yet be available, increasing the urgency for mitigation. This vulnerability is critical because it allows unauthenticated attackers to execute arbitrary PHP code remotely, potentially leading to full system compromise, data theft, or service disruption.

Potential Impact

The impact of CVE-2025-22279 is significant for organizations using the Crocoblock JetCompareWishlist plugin in their PHP-based web applications, particularly WordPress sites. Successful exploitation can lead to remote code execution, allowing attackers to run arbitrary commands on the web server. This can result in data breaches, website defacement, installation of backdoors, lateral movement within the network, and complete loss of system integrity and availability. E-commerce platforms relying on this plugin may face financial losses, reputational damage, and regulatory penalties due to compromised customer data. Since the vulnerability does not require authentication and can be triggered remotely, the attack surface is broad, especially for publicly accessible websites. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers often develop exploits rapidly after disclosure. Organizations with high-traffic websites or those in regulated industries are particularly vulnerable to the consequences of this flaw.

Mitigation Recommendations

To mitigate CVE-2025-22279, organizations should take the following specific actions: 1) Immediately audit all instances of the JetCompareWishlist plugin and identify affected versions (<=1.5.9). 2) Restrict or disable the plugin if a patch or update is not yet available to prevent exploitation. 3) Implement strict input validation and sanitization on any parameters that influence file inclusion to prevent manipulation. 4) Use PHP configuration directives such as 'allow_url_include=Off' and disable 'allow_url_fopen' to reduce remote file inclusion risks. 5) Employ web application firewalls (WAFs) with rules targeting suspicious file inclusion patterns to detect and block exploitation attempts. 6) Monitor web server logs for unusual requests that attempt to include external or unexpected files. 7) Follow Crocoblock vendor channels closely for patches or updates and apply them promptly once released. 8) Consider isolating the web server environment using containerization or sandboxing to limit the impact of potential exploitation. 9) Educate development and security teams about secure coding practices related to file inclusion and PHP application security. These measures, combined, will reduce the likelihood and impact of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-03T13:15:43.299Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75d4e6bfc5ba1df07f7b

Added to database: 4/1/2026, 7:45:24 PM

Last enriched: 4/2/2026, 2:42:44 AM

Last updated: 4/6/2026, 9:38:14 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses