CVE-2025-28888: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in BZOTheme GiftXtore
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BZOTheme GiftXtore allows PHP Local File Inclusion. This issue affects GiftXtore: from n/a through 1.7.4.
AI Analysis
Technical Summary
CVE-2025-28888 is a high-severity vulnerability classified under CWE-98, which concerns improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the BZOTheme GiftXtore product up to version 1.7.4. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP's include or require functions to load arbitrary files from the local filesystem. This can lead to the execution of malicious code or disclosure of sensitive information. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, but it has a high attack complexity, indicating some conditions must be met for successful exploitation. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. The vulnerability can result in full compromise of the affected web application, potentially allowing attackers to execute arbitrary PHP code, read sensitive files, or disrupt service availability. No public exploits are currently known, and no patches have been linked yet, suggesting that mitigation may require vendor updates or manual code review and hardening.
Potential Impact
For European organizations using the BZOTheme GiftXtore product, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property, or internal configuration files, violating GDPR and other data protection regulations. The ability to execute arbitrary code could allow attackers to pivot within the network, deploy ransomware, or disrupt e-commerce operations, leading to financial losses and reputational damage. Given the remote exploitability without authentication, attackers can target vulnerable web servers directly from the internet. The high impact on confidentiality, integrity, and availability means organizations could face data breaches, service outages, and compliance penalties. This is particularly critical for European retailers and service providers relying on GiftXtore for online storefronts.
Mitigation Recommendations
Organizations should immediately inventory their use of BZOTheme GiftXtore and identify affected versions up to 1.7.4. Until an official patch is released, mitigations include: implementing strict input validation and sanitization on any parameters used in include or require statements to prevent path traversal or injection; employing web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts; restricting PHP file inclusion paths via configuration (e.g., open_basedir directive) to limit accessible directories; disabling unnecessary PHP functions that facilitate file inclusion; and monitoring logs for unusual access patterns indicative of exploitation attempts. Additionally, organizations should engage with BZOTheme for timely patch releases and apply updates promptly once available. Conducting code audits and penetration testing focused on file inclusion vulnerabilities can further reduce risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-28888: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in BZOTheme GiftXtore
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BZOTheme GiftXtore allows PHP Local File Inclusion. This issue affects GiftXtore: from n/a through 1.7.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-28888 is a high-severity vulnerability classified under CWE-98, which concerns improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the BZOTheme GiftXtore product up to version 1.7.4. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP's include or require functions to load arbitrary files from the local filesystem. This can lead to the execution of malicious code or disclosure of sensitive information. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, but it has a high attack complexity, indicating some conditions must be met for successful exploitation. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. The vulnerability can result in full compromise of the affected web application, potentially allowing attackers to execute arbitrary PHP code, read sensitive files, or disrupt service availability. No public exploits are currently known, and no patches have been linked yet, suggesting that mitigation may require vendor updates or manual code review and hardening.
Potential Impact
For European organizations using the BZOTheme GiftXtore product, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property, or internal configuration files, violating GDPR and other data protection regulations. The ability to execute arbitrary code could allow attackers to pivot within the network, deploy ransomware, or disrupt e-commerce operations, leading to financial losses and reputational damage. Given the remote exploitability without authentication, attackers can target vulnerable web servers directly from the internet. The high impact on confidentiality, integrity, and availability means organizations could face data breaches, service outages, and compliance penalties. This is particularly critical for European retailers and service providers relying on GiftXtore for online storefronts.
Mitigation Recommendations
Organizations should immediately inventory their use of BZOTheme GiftXtore and identify affected versions up to 1.7.4. Until an official patch is released, mitigations include: implementing strict input validation and sanitization on any parameters used in include or require statements to prevent path traversal or injection; employing web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts; restricting PHP file inclusion paths via configuration (e.g., open_basedir directive) to limit accessible directories; disabling unnecessary PHP functions that facilitate file inclusion; and monitoring logs for unusual access patterns indicative of exploitation attempts. Additionally, organizations should engage with BZOTheme for timely patch releases and apply updates promptly once available. Conducting code audits and penetration testing focused on file inclusion vulnerabilities can further reduce risk.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-03-11T08:09:09.176Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f5b1b0bd07c3938c8b3
Added to database: 6/10/2025, 6:54:19 PM
Last enriched: 7/10/2025, 10:04:53 PM
Last updated: 1/7/2026, 6:09:52 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.