CVE-2025-30635: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeAtelier IDonatePro
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeAtelier IDonatePro allows PHP Local File Inclusion. This issue affects IDonatePro: from n/a through 2.1.9.
AI Analysis
Technical Summary
CVE-2025-30635 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP applications. Specifically, this vulnerability affects ThemeAtelier's IDonatePro product, versions up to 2.1.9. The flaw allows an attacker to perform PHP Local File Inclusion (LFI), a type of attack where the application improperly handles user-supplied input for file inclusion functions. This can lead to arbitrary code execution, disclosure of sensitive files, or full system compromise. The vulnerability arises because the application does not sufficiently validate or sanitize the filename parameter used in include or require statements, enabling an attacker to manipulate the path to include unintended files from the local filesystem. Although the description mentions 'PHP Remote File Inclusion' in the title, the detailed description clarifies that the actual issue is Local File Inclusion. The CVSS v3.1 score is 8.1, indicating a high severity with network attack vector, high impact on confidentiality, integrity, and availability, no privileges required, and no user interaction needed. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that the vulnerability is newly disclosed and may be targeted soon. The vulnerability can be exploited remotely by sending crafted requests to the vulnerable PHP application, potentially allowing attackers to execute arbitrary PHP code or read sensitive files, leading to full compromise of the web server and possibly lateral movement within the network.
Potential Impact
For European organizations using ThemeAtelier's IDonatePro, this vulnerability poses a significant risk. Given the high CVSS score and the nature of the flaw, attackers could gain unauthorized access to sensitive donor information, financial data, or internal systems, leading to data breaches, reputational damage, and regulatory non-compliance under GDPR. The ability to execute arbitrary code or read sensitive files could also facilitate ransomware deployment or persistent backdoors. Non-profit organizations and charities, which are common users of donation management software like IDonatePro, may be particularly vulnerable due to potentially limited cybersecurity resources. The impact extends beyond data loss to operational disruption and potential legal consequences. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale, increasing the risk of widespread attacks targeting European entities relying on this software.
Mitigation Recommendations
European organizations should immediately audit their use of ThemeAtelier IDonatePro to determine if they are running affected versions (up to 2.1.9). Until an official patch is released, organizations should implement strict input validation and sanitization on all parameters that influence file inclusion paths, ideally by applying web application firewall (WAF) rules to detect and block suspicious requests attempting to exploit LFI. Disabling PHP functions such as include(), require(), include_once(), and require_once() from processing user-controlled input can reduce risk. Additionally, running the application with the least privileges and isolating it in a container or sandbox environment can limit potential damage. Monitoring logs for unusual file access patterns or error messages related to file inclusion attempts is critical for early detection. Organizations should also prepare for rapid patch deployment once ThemeAtelier releases an official fix and consider engaging with cybersecurity vendors for threat intelligence updates regarding exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-30635: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeAtelier IDonatePro
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeAtelier IDonatePro allows PHP Local File Inclusion. This issue affects IDonatePro: from n/a through 2.1.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-30635 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP applications. Specifically, this vulnerability affects ThemeAtelier's IDonatePro product, versions up to 2.1.9. The flaw allows an attacker to perform PHP Local File Inclusion (LFI), a type of attack where the application improperly handles user-supplied input for file inclusion functions. This can lead to arbitrary code execution, disclosure of sensitive files, or full system compromise. The vulnerability arises because the application does not sufficiently validate or sanitize the filename parameter used in include or require statements, enabling an attacker to manipulate the path to include unintended files from the local filesystem. Although the description mentions 'PHP Remote File Inclusion' in the title, the detailed description clarifies that the actual issue is Local File Inclusion. The CVSS v3.1 score is 8.1, indicating a high severity with network attack vector, high impact on confidentiality, integrity, and availability, no privileges required, and no user interaction needed. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that the vulnerability is newly disclosed and may be targeted soon. The vulnerability can be exploited remotely by sending crafted requests to the vulnerable PHP application, potentially allowing attackers to execute arbitrary PHP code or read sensitive files, leading to full compromise of the web server and possibly lateral movement within the network.
Potential Impact
For European organizations using ThemeAtelier's IDonatePro, this vulnerability poses a significant risk. Given the high CVSS score and the nature of the flaw, attackers could gain unauthorized access to sensitive donor information, financial data, or internal systems, leading to data breaches, reputational damage, and regulatory non-compliance under GDPR. The ability to execute arbitrary code or read sensitive files could also facilitate ransomware deployment or persistent backdoors. Non-profit organizations and charities, which are common users of donation management software like IDonatePro, may be particularly vulnerable due to potentially limited cybersecurity resources. The impact extends beyond data loss to operational disruption and potential legal consequences. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale, increasing the risk of widespread attacks targeting European entities relying on this software.
Mitigation Recommendations
European organizations should immediately audit their use of ThemeAtelier IDonatePro to determine if they are running affected versions (up to 2.1.9). Until an official patch is released, organizations should implement strict input validation and sanitization on all parameters that influence file inclusion paths, ideally by applying web application firewall (WAF) rules to detect and block suspicious requests attempting to exploit LFI. Disabling PHP functions such as include(), require(), include_once(), and require_once() from processing user-controlled input can reduce risk. Additionally, running the application with the least privileges and isolating it in a container or sandbox environment can limit potential damage. Monitoring logs for unusual file access patterns or error messages related to file inclusion attempts is critical for early detection. Organizations should also prepare for rapid patch deployment once ThemeAtelier releases an official fix and consider engaging with cybersecurity vendors for threat intelligence updates regarding exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-03-24T13:01:06.202Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689dbee1ad5a09ad0059e57e
Added to database: 8/14/2025, 10:48:01 AM
Last enriched: 8/14/2025, 12:19:26 PM
Last updated: 8/21/2025, 12:35:15 AM
Views: 1
Related Threats
CVE-2025-58361: CWE-20: Improper Input Validation in MarceloTessaro promptcraft-forge-studio
CriticalCVE-2025-58353: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MarceloTessaro promptcraft-forge-studio
HighCVE-2025-32322: Elevation of privilege in Google Android
HighCVE-2025-22415: Elevation of privilege in Google Android
HighCVE-2025-22414: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.