Skip to main content

CVE-2025-24768: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in snstheme Nitan

High
VulnerabilityCVE-2025-24768cvecve-2025-24768cwe-98
Published: Mon Jun 09 2025 (06/09/2025, 15:56:55 UTC)
Source: CVE Database V5
Vendor/Project: snstheme
Product: Nitan

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Nitan allows PHP Local File Inclusion. This issue affects Nitan: from n/a through 2.9.

AI-Powered Analysis

AILast updated: 07/11/2025, 01:48:54 UTC

Technical Analysis

CVE-2025-24768 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the snstheme product named Nitan, versions up to 2.9. The issue allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter in such a way that unauthorized files on the server can be included and executed within the PHP context. This can lead to full compromise of confidentiality, integrity, and availability of the affected system. The vulnerability is remotely exploitable over the network (AV:N), does not require privileges (PR:N), nor user interaction (UI:N), but does require a high attack complexity (AC:H), indicating some non-trivial conditions must be met to exploit it. The CVSS v3.1 base score is 8.1, reflecting the high impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the potential for severe damage exists if exploited. The vulnerability arises from insufficient validation or sanitization of input controlling the filename in PHP include/require statements, allowing attackers to traverse directories or specify arbitrary local files to be included and executed by the web server. This can lead to disclosure of sensitive files, execution of arbitrary code, or denial of service.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using the snstheme Nitan product in their web infrastructure. Exploitation could lead to unauthorized access to sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code or include sensitive files can lead to full system compromise, data breaches, service outages, and lateral movement within networks. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data and the critical nature of their services. The high severity and remote exploitability without authentication make this vulnerability a prime target for attackers aiming to gain initial access or escalate privileges within European networks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately identify and inventory all instances of the snstheme Nitan product in their environment. Since no patch links are currently available, organizations should implement the following practical steps: 1) Apply strict input validation and sanitization on all parameters controlling include/require statements to ensure only allowed filenames or paths are processed. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious include/require parameter manipulations indicative of LFI attempts. 3) Restrict PHP configuration settings such as 'allow_url_include' to 'Off' to prevent remote file inclusion vectors. 4) Use PHP open_basedir restrictions to limit the directories accessible by PHP scripts, reducing the risk of arbitrary file inclusion. 5) Monitor logs for unusual file inclusion attempts and anomalous web requests targeting the vulnerable endpoints. 6) Plan for rapid patching once an official fix is released by the vendor. 7) Conduct security code reviews and penetration testing focused on include/require statement usage in PHP applications. These targeted measures go beyond generic advice by focusing on the specific nature of this vulnerability and the affected product.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:53:16.439Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a91c

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 1:48:54 AM

Last updated: 8/13/2025, 7:36:51 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats