Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22509: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in TMRW-studio Atlas

0
Critical
VulnerabilityCVE-2025-22509cvecve-2025-22509
Published: Thu Jan 08 2026 (01/08/2026, 09:17:38 UTC)
Source: CVE Database V5
Vendor/Project: TMRW-studio
Product: Atlas

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in TMRW-studio Atlas atlas allows PHP Local File Inclusion.This issue affects Atlas: from n/a through <= 2.1.0.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:31:49 UTC

Technical Analysis

CVE-2025-22509 is a critical security vulnerability classified as a Remote File Inclusion (RFI) flaw in the PHP-based TMRW-studio Atlas product, affecting versions up to and including 2.1.0. The vulnerability stems from improper validation and control of filenames used in PHP include or require statements, which are mechanisms to incorporate external files into a PHP script during execution. When these filenames are not properly sanitized, an attacker can manipulate the input to include arbitrary remote files, typically hosted on attacker-controlled servers. This leads to remote code execution, allowing attackers to run malicious PHP code on the vulnerable server. The CVSS 3.1 base score of 9.8 reflects the vulnerability's criticality, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability was publicly disclosed in January 2026, with no known exploits in the wild at the time of reporting. However, the nature of RFI vulnerabilities makes them highly attractive targets for attackers seeking to compromise web servers, steal sensitive data, or disrupt services. The lack of available patches at disclosure time necessitates immediate defensive measures. The vulnerability affects all deployments of Atlas up to version 2.1.0, which may be used in various sectors including enterprise web applications, content management, or other PHP-based services. Attackers exploiting this flaw can gain full control over the affected system, potentially pivoting within networks or deploying ransomware or other malware payloads.

Potential Impact

For European organizations, the impact of CVE-2025-22509 is substantial. Successful exploitation can lead to complete system compromise, data exfiltration, defacement, or denial of service. Organizations handling sensitive personal data, intellectual property, or critical infrastructure could face severe confidentiality breaches and operational disruptions. The vulnerability's remote exploitation capability without authentication means attackers can target internet-facing Atlas installations directly, increasing risk exposure. Regulatory implications under GDPR could arise from data breaches, leading to fines and reputational damage. Additionally, attackers might leverage compromised systems as footholds for lateral movement within corporate networks, escalating the threat to broader enterprise environments. The criticality of this vulnerability demands urgent attention from European entities using Atlas, especially those in finance, healthcare, government, and technology sectors where data sensitivity and service availability are paramount.

Mitigation Recommendations

1. Apply official patches or updates from TMRW-studio as soon as they become available to address the vulnerability directly. 2. In the absence of patches, implement strict input validation and sanitization on all parameters that influence file inclusion paths, ensuring only allowed files or directories can be referenced. 3. Configure PHP settings to disable remote file inclusion by setting 'allow_url_include' to 'Off' and 'allow_url_fopen' to 'Off' where feasible. 4. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block attempts to exploit file inclusion vulnerabilities. 5. Conduct thorough code reviews and security audits of customizations or integrations involving Atlas to identify and remediate unsafe include/require usage. 6. Restrict network access to Atlas management interfaces and limit exposure to trusted IP ranges. 7. Monitor logs for suspicious requests containing unusual file path parameters or attempts to include external URLs. 8. Educate development and operations teams about secure coding practices related to file inclusion and PHP configuration hardening.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-07T10:22:41.465Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695f7a58c901b06321d0bb38

Added to database: 1/8/2026, 9:35:20 AM

Last enriched: 1/22/2026, 8:31:49 PM

Last updated: 2/5/2026, 10:55:56 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats