Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-28946: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in BZOTheme PrintXtore

0
High
VulnerabilityCVE-2025-28946cvecve-2025-28946cwe-98
Published: Fri Jun 27 2025 (06/27/2025, 11:52:44 UTC)
Source: CVE Database V5
Vendor/Project: BZOTheme
Product: PrintXtore

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BZOTheme PrintXtore allows PHP Local File Inclusion.This issue affects PrintXtore: from n/a before 1.7.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:24:10 UTC

Technical Analysis

CVE-2025-28946 is a vulnerability classified under CWE-98, which involves improper control of filenames used in PHP include or require statements. This flaw exists in the BZOTheme PrintXtore product, affecting all versions prior to 1.7.8. The vulnerability enables remote file inclusion (RFI), where an attacker can manipulate the filename parameter to include and execute arbitrary remote PHP code on the server. This occurs because the application fails to properly validate or sanitize user-supplied input that determines which files are included. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, although it has a high attack complexity, indicating some conditions or knowledge are needed to exploit it successfully. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise, data leakage, or denial of service. No patches or exploit code are currently publicly available, but the vulnerability is publicly disclosed and should be considered a significant risk. The vulnerability is particularly dangerous in web hosting environments where PrintXtore is deployed, as it can be used to execute arbitrary PHP code remotely, potentially leading to server takeover.

Potential Impact

The impact of CVE-2025-28946 is severe for organizations using the vulnerable versions of BZOTheme PrintXtore. Successful exploitation can lead to remote code execution, allowing attackers to gain unauthorized access to sensitive data, modify or delete files, disrupt services, or use the compromised server as a pivot point for further attacks within the network. This can result in data breaches, loss of customer trust, financial losses, and regulatory penalties. Since the vulnerability does not require authentication or user interaction, it can be exploited by automated attacks or worms, increasing the risk of widespread compromise. Organizations running e-commerce or content management systems based on PrintXtore are particularly at risk, as attackers may target these platforms to steal payment information or inject malicious content. The high attack complexity somewhat limits exploitation but does not eliminate the threat, especially from skilled attackers. The lack of known exploits in the wild currently reduces immediate risk but does not guarantee safety, as exploit code may emerge rapidly after disclosure.

Mitigation Recommendations

To mitigate CVE-2025-28946, organizations should immediately upgrade BZOTheme PrintXtore to version 1.7.8 or later once patches are released. Until then, administrators should implement strict input validation and sanitization on all parameters that control file inclusion, ensuring only allowed and safe filenames are processed. Employing a web application firewall (WAF) with rules to detect and block suspicious file inclusion attempts can reduce exposure. Disabling remote file inclusion in PHP configurations (e.g., setting allow_url_include=Off) and restricting PHP file permissions can limit the attack surface. Regularly auditing web application logs for unusual requests and monitoring for signs of compromise is critical. Network segmentation and least privilege principles should be enforced to contain potential breaches. Additionally, organizations should maintain up-to-date backups and have incident response plans ready to address potential exploitation. Security teams should stay alert for any published exploits or patches related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:10:12.305Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685e88edca1063fb875de484

Added to database: 6/27/2025, 12:05:01 PM

Last enriched: 3/18/2026, 6:24:10 PM

Last updated: 3/26/2026, 10:06:16 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses