CVE-2025-25141: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in zankover Fami Sales Popup
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in zankover Fami Sales Popup fami-sales-popup allows PHP Local File Inclusion.This issue affects Fami Sales Popup: from n/a through <= 2.0.0.
AI Analysis
Technical Summary
CVE-2025-25141 is a Local File Inclusion (LFI) vulnerability found in the zankover Fami Sales Popup plugin for PHP-based web applications. The vulnerability arises from improper control over the filename parameter used in PHP's include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the local filesystem. This can lead to sensitive information disclosure, such as configuration files, source code, or credentials stored on the server. In some configurations, it may also enable remote code execution if an attacker can include files containing malicious PHP code. The affected versions include all releases up to and including 2.0.0. The vulnerability was publicly disclosed in early 2025, but no public exploits have been reported yet. The lack of a CVSS score indicates that the vulnerability is newly discovered and pending further analysis. However, the nature of LFI vulnerabilities in PHP applications is well understood and typically considered high risk due to the ease of exploitation and potential for severe impact. The vulnerability is particularly critical in environments where the plugin is exposed to untrusted user input without adequate sanitization or access controls. Since the plugin is likely used in e-commerce or sales-related websites, exploitation could lead to significant business disruption and data breaches.
Potential Impact
The impact of CVE-2025-25141 can be severe for organizations using the affected plugin. Successful exploitation may allow attackers to read sensitive files on the server, such as configuration files containing database credentials, API keys, or other secrets. This can lead to further compromise of the web application and backend systems. In some scenarios, attackers might achieve remote code execution by including files with malicious PHP code, resulting in full server compromise. The vulnerability can also be leveraged to escalate privileges or pivot within the network. For e-commerce or sales platforms using the plugin, this could mean theft of customer data, financial fraud, or disruption of sales operations. The absence of authentication requirements and the potential for remote exploitation increase the risk profile. Organizations worldwide that rely on PHP-based web applications and use this plugin are at risk, especially if they have not implemented strict input validation or isolation measures. The reputational damage, regulatory penalties, and operational downtime resulting from exploitation could be significant.
Mitigation Recommendations
To mitigate CVE-2025-25141, organizations should first identify all instances of the zankover Fami Sales Popup plugin in their environments. Since no patch links are currently available, immediate mitigation involves implementing strict input validation and sanitization for any parameters that influence file inclusion. Employing a whitelist approach to restrict included files to known safe paths is critical. Additionally, configuring the PHP environment to disable dangerous functions such as allow_url_include and restricting file system permissions can reduce exploitation risk. Web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting to exploit file inclusion. Monitoring logs for unusual file access patterns is also recommended. Once an official patch or update is released by the vendor, organizations should apply it promptly. Regular security assessments and code reviews of plugins and third-party components can help prevent similar vulnerabilities. Finally, isolating critical web applications and employing defense-in-depth strategies will limit the impact of any successful exploitation.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, India, Brazil, Japan, Netherlands
CVE-2025-25141: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in zankover Fami Sales Popup
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in zankover Fami Sales Popup fami-sales-popup allows PHP Local File Inclusion.This issue affects Fami Sales Popup: from n/a through <= 2.0.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-25141 is a Local File Inclusion (LFI) vulnerability found in the zankover Fami Sales Popup plugin for PHP-based web applications. The vulnerability arises from improper control over the filename parameter used in PHP's include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the local filesystem. This can lead to sensitive information disclosure, such as configuration files, source code, or credentials stored on the server. In some configurations, it may also enable remote code execution if an attacker can include files containing malicious PHP code. The affected versions include all releases up to and including 2.0.0. The vulnerability was publicly disclosed in early 2025, but no public exploits have been reported yet. The lack of a CVSS score indicates that the vulnerability is newly discovered and pending further analysis. However, the nature of LFI vulnerabilities in PHP applications is well understood and typically considered high risk due to the ease of exploitation and potential for severe impact. The vulnerability is particularly critical in environments where the plugin is exposed to untrusted user input without adequate sanitization or access controls. Since the plugin is likely used in e-commerce or sales-related websites, exploitation could lead to significant business disruption and data breaches.
Potential Impact
The impact of CVE-2025-25141 can be severe for organizations using the affected plugin. Successful exploitation may allow attackers to read sensitive files on the server, such as configuration files containing database credentials, API keys, or other secrets. This can lead to further compromise of the web application and backend systems. In some scenarios, attackers might achieve remote code execution by including files with malicious PHP code, resulting in full server compromise. The vulnerability can also be leveraged to escalate privileges or pivot within the network. For e-commerce or sales platforms using the plugin, this could mean theft of customer data, financial fraud, or disruption of sales operations. The absence of authentication requirements and the potential for remote exploitation increase the risk profile. Organizations worldwide that rely on PHP-based web applications and use this plugin are at risk, especially if they have not implemented strict input validation or isolation measures. The reputational damage, regulatory penalties, and operational downtime resulting from exploitation could be significant.
Mitigation Recommendations
To mitigate CVE-2025-25141, organizations should first identify all instances of the zankover Fami Sales Popup plugin in their environments. Since no patch links are currently available, immediate mitigation involves implementing strict input validation and sanitization for any parameters that influence file inclusion. Employing a whitelist approach to restrict included files to known safe paths is critical. Additionally, configuring the PHP environment to disable dangerous functions such as allow_url_include and restricting file system permissions can reduce exploitation risk. Web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting to exploit file inclusion. Monitoring logs for unusual file access patterns is also recommended. Once an official patch or update is released by the vendor, organizations should apply it promptly. Regular security assessments and code reviews of plugins and third-party components can help prevent similar vulnerabilities. Finally, isolating critical web applications and employing defense-in-depth strategies will limit the impact of any successful exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-02-03T13:35:08.293Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd7291e6bfc5ba1deead92
Added to database: 4/1/2026, 7:31:29 PM
Last enriched: 4/1/2026, 10:00:47 PM
Last updated: 4/6/2026, 9:18:32 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.