Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25109: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in JoomSky WP Vehicle Manager

0
Unknown
VulnerabilityCVE-2025-25109cvecve-2025-25109
Published: Mon Mar 03 2025 (03/03/2025, 13:30:23 UTC)
Source: CVE Database V5
Vendor/Project: JoomSky
Product: WP Vehicle Manager

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky WP Vehicle Manager js-vehicle-manager allows PHP Local File Inclusion.This issue affects WP Vehicle Manager: from n/a through <= 3.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:54:16 UTC

Technical Analysis

CVE-2025-25109 is a Local File Inclusion (LFI) vulnerability found in the JoomSky WP Vehicle Manager WordPress plugin, specifically in versions up to 3.1. The vulnerability arises from improper validation and control over the filename parameter used in PHP include or require statements. This flaw allows an attacker to manipulate the input to include arbitrary files from the local filesystem on the web server. By exploiting this, an attacker can execute arbitrary PHP code if they can upload malicious files or read sensitive files such as configuration files containing credentials. The vulnerability is classified as an improper control of filename for include/require statements, a common PHP security issue. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability was reserved in early February 2025 and published in March 2025. The plugin is widely used in WordPress sites that manage vehicle listings, making it a target for attackers seeking to compromise automotive-related websites or gain footholds in WordPress environments. The lack of authentication requirement for exploitation increases the attack surface significantly. The vulnerability can lead to remote code execution, data disclosure, and potential full server compromise if exploited successfully.

Potential Impact

The impact of this vulnerability is significant for organizations using the affected WP Vehicle Manager plugin. Successful exploitation can lead to remote code execution on the web server, allowing attackers to execute arbitrary PHP code, potentially leading to full server compromise. This can result in data theft, website defacement, installation of backdoors, or pivoting to internal networks. Confidentiality is at risk due to possible exposure of sensitive files such as database credentials or configuration files. Integrity and availability can also be compromised by malicious modifications or denial of service attacks. Since the vulnerability does not require authentication, any attacker with network access to the vulnerable WordPress site can attempt exploitation. This increases the risk for publicly accessible websites. Organizations relying on this plugin for vehicle management, especially in sectors like automotive sales, rentals, or fleet management, face operational disruption and reputational damage if exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately identify if they are using the JoomSky WP Vehicle Manager plugin version 3.1 or earlier. Until a patch is released, the safest approach is to disable or uninstall the plugin to eliminate the attack vector. Monitor official JoomSky channels and security advisories for patch releases and apply updates promptly once available. Implement web application firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations. Restrict file permissions on the web server to limit access to sensitive files and directories, reducing the impact of potential LFI exploitation. Conduct regular security audits and vulnerability scans on WordPress installations and plugins. Employ network segmentation and least privilege principles to limit attacker movement if compromise occurs. Additionally, monitor logs for unusual file access patterns indicative of LFI attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-03T13:34:30.657Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd728be6bfc5ba1deeabcf

Added to database: 4/1/2026, 7:31:23 PM

Last enriched: 4/1/2026, 9:54:16 PM

Last updated: 4/6/2026, 11:30:37 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses