CVE-2025-30849: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in g5theme Essential Real Estate
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in g5theme Essential Real Estate essential-real-estate allows PHP Local File Inclusion.This issue affects Essential Real Estate: from n/a through <= 5.2.0.
AI Analysis
Technical Summary
CVE-2025-30849 identifies a Local File Inclusion (LFI) vulnerability in the g5theme Essential Real Estate WordPress theme, specifically in versions up to 5.2.0. The vulnerability stems from improper control over the filename parameter used in PHP's include or require statements. This flaw allows an attacker to manipulate the input to include arbitrary files from the server's filesystem. Such an attack can lead to disclosure of sensitive files (e.g., configuration files, password stores), or in some cases, remote code execution if combined with other vulnerabilities or writable file locations. The vulnerability is categorized as a PHP Remote File Inclusion type but is actually a Local File Inclusion since it involves local files. The root cause is insufficient input validation or sanitization of user-controlled parameters that dictate which files are included by the PHP application. No official patches or exploit code are currently published, but the vulnerability is publicly disclosed and assigned CVE-2025-30849. The affected product is a popular WordPress theme used in real estate websites, which often handle sensitive client data and business-critical information. The absence of a CVSS score requires an expert severity assessment based on impact and exploitability factors.
Potential Impact
The primary impact of this vulnerability is unauthorized access to sensitive files on the web server, which can lead to information disclosure including credentials, configuration files, or other private data. In some scenarios, attackers might leverage this flaw to execute arbitrary code, escalate privileges, or pivot within the network. For organizations, this can result in data breaches, loss of customer trust, regulatory penalties, and operational disruption. Real estate websites often contain personal client information and financial data, increasing the risk and potential damage. Since the vulnerability does not require authentication and can be triggered remotely, the attack surface is broad. Exploitation could also facilitate further attacks such as webshell deployment or lateral movement. The lack of known exploits currently reduces immediate risk but the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
Organizations should immediately monitor for any suspicious file inclusion attempts in web server logs and implement web application firewall (WAF) rules to block malicious input patterns targeting include/require parameters. Once available, update the g5theme Essential Real Estate theme to a patched version that properly validates and sanitizes input used in file inclusion functions. In the interim, restrict PHP include paths using open_basedir or disable allow_url_include in PHP configurations to limit file inclusion scope. Employ principle of least privilege on web server file permissions to minimize accessible files. Conduct code reviews and penetration testing focused on file inclusion vectors. Additionally, consider isolating the affected application environment and applying network segmentation to limit potential lateral movement if exploitation occurs. Regular backups and incident response plans should be prepared in case of compromise.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, South Africa, Netherlands
CVE-2025-30849: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in g5theme Essential Real Estate
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in g5theme Essential Real Estate essential-real-estate allows PHP Local File Inclusion.This issue affects Essential Real Estate: from n/a through <= 5.2.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-30849 identifies a Local File Inclusion (LFI) vulnerability in the g5theme Essential Real Estate WordPress theme, specifically in versions up to 5.2.0. The vulnerability stems from improper control over the filename parameter used in PHP's include or require statements. This flaw allows an attacker to manipulate the input to include arbitrary files from the server's filesystem. Such an attack can lead to disclosure of sensitive files (e.g., configuration files, password stores), or in some cases, remote code execution if combined with other vulnerabilities or writable file locations. The vulnerability is categorized as a PHP Remote File Inclusion type but is actually a Local File Inclusion since it involves local files. The root cause is insufficient input validation or sanitization of user-controlled parameters that dictate which files are included by the PHP application. No official patches or exploit code are currently published, but the vulnerability is publicly disclosed and assigned CVE-2025-30849. The affected product is a popular WordPress theme used in real estate websites, which often handle sensitive client data and business-critical information. The absence of a CVSS score requires an expert severity assessment based on impact and exploitability factors.
Potential Impact
The primary impact of this vulnerability is unauthorized access to sensitive files on the web server, which can lead to information disclosure including credentials, configuration files, or other private data. In some scenarios, attackers might leverage this flaw to execute arbitrary code, escalate privileges, or pivot within the network. For organizations, this can result in data breaches, loss of customer trust, regulatory penalties, and operational disruption. Real estate websites often contain personal client information and financial data, increasing the risk and potential damage. Since the vulnerability does not require authentication and can be triggered remotely, the attack surface is broad. Exploitation could also facilitate further attacks such as webshell deployment or lateral movement. The lack of known exploits currently reduces immediate risk but the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
Organizations should immediately monitor for any suspicious file inclusion attempts in web server logs and implement web application firewall (WAF) rules to block malicious input patterns targeting include/require parameters. Once available, update the g5theme Essential Real Estate theme to a patched version that properly validates and sanitizes input used in file inclusion functions. In the interim, restrict PHP include paths using open_basedir or disable allow_url_include in PHP configurations to limit file inclusion scope. Employ principle of least privilege on web server file permissions to minimize accessible files. Conduct code reviews and penetration testing focused on file inclusion vectors. Additionally, consider isolating the affected application environment and applying network segmentation to limit potential lateral movement if exploitation occurs. Regular backups and incident response plans should be prepared in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-03-26T09:20:54.385Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd7329e6bfc5ba1def0b20
Added to database: 4/1/2026, 7:34:01 PM
Last enriched: 4/2/2026, 12:29:43 AM
Last updated: 4/6/2026, 12:41:22 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.