Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22364: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Service Shogun Ach Invoice App

0
Unknown
VulnerabilityCVE-2025-22364cvecve-2025-22364
Published: Tue Jan 07 2025 (01/07/2025, 10:48:33 UTC)
Source: CVE Database V5
Vendor/Project: Service Shogun
Product: Ach Invoice App

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Service Shogun Ach Invoice App ach-invoice-app allows PHP Local File Inclusion.This issue affects Ach Invoice App: from n/a through <= 1.0.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:13:34 UTC

Technical Analysis

CVE-2025-22364 is a Local File Inclusion (LFI) vulnerability found in the Service Shogun Ach Invoice App, a PHP-based invoicing application. The vulnerability arises from improper control over the filename parameter used in PHP's include or require statements, allowing an attacker to manipulate the file path. This manipulation can lead to inclusion of arbitrary files from the server's filesystem, potentially exposing sensitive configuration files, source code, or enabling remote code execution if combined with other vulnerabilities. The affected versions include all releases up to and including 1.0.1. The vulnerability was publicly disclosed in early 2025, with no CVSS score assigned yet and no known exploits in the wild. The flaw is typical of insecure coding practices where user input is not properly sanitized or validated before being used in critical file operations. Exploitation does not require authentication or user interaction, making it accessible to remote attackers. The lack of official patches necessitates immediate mitigation by users of the affected software. This vulnerability can lead to severe breaches of confidentiality, integrity, and availability within affected systems.

Potential Impact

The impact of CVE-2025-22364 on organizations worldwide can be significant. Successful exploitation allows attackers to read sensitive files such as configuration files containing database credentials, application source code, or system files, leading to data breaches and intellectual property theft. In some cases, attackers may leverage this vulnerability to execute arbitrary code, resulting in full system compromise. This can disrupt business operations, cause financial losses, and damage organizational reputation. Since the Ach Invoice App is used for financial invoicing, exposure of invoice data or manipulation of financial records could lead to fraud or compliance violations. The vulnerability's remote exploitability without authentication increases the attack surface, making organizations more vulnerable to automated scanning and exploitation attempts. The absence of patches and known exploits in the wild currently limits immediate widespread impact, but the risk remains high if attackers develop exploits. Organizations relying on this software must act swiftly to prevent potential breaches and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2025-22364, organizations should implement the following specific measures: 1) Immediately audit and restrict the input parameters controlling file inclusion in the Ach Invoice App to ensure only safe, expected filenames are accepted. 2) Employ strict whitelisting of allowable include paths and filenames rather than blacklisting or no filtering. 3) Use PHP functions such as realpath() to resolve and verify file paths before inclusion to prevent directory traversal. 4) Disable remote file inclusion in PHP configuration (allow_url_include=Off) if not already set. 5) Isolate the invoicing application in a restricted environment with minimal privileges to limit damage from potential exploitation. 6) Monitor application logs and network traffic for unusual file access patterns or inclusion attempts. 7) Engage with the vendor (Service Shogun) for patches or updates and apply them promptly once available. 8) Consider implementing Web Application Firewalls (WAFs) with rules to detect and block LFI attack patterns targeting this application. 9) Conduct regular security assessments and code reviews focusing on input validation and file handling. These targeted steps go beyond generic advice and address the root cause and exploitation vectors of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-03T13:16:57.348Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75e5e6bfc5ba1df084d8

Added to database: 4/1/2026, 7:45:41 PM

Last enriched: 4/2/2026, 10:13:34 AM

Last updated: 4/6/2026, 11:30:37 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses