Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31014: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Hossein Material Dashboard

0
Unknown
VulnerabilityCVE-2025-31014cvecve-2025-31014
Published: Fri Apr 11 2025 (04/11/2025, 08:42:48 UTC)
Source: CVE Database V5
Vendor/Project: Hossein
Product: Material Dashboard

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hossein Material Dashboard material-dashboard allows PHP Local File Inclusion.This issue affects Material Dashboard: from n/a through <= 1.4.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 00:51:40 UTC

Technical Analysis

CVE-2025-31014 is a Remote File Inclusion vulnerability found in the Hossein Material Dashboard, a PHP-based web application framework used for building dashboards. The vulnerability stems from improper validation and control of filenames passed to PHP's include or require statements. This flaw allows an attacker to supply a crafted filename parameter that references a remote malicious file, which the PHP interpreter then includes and executes. This can lead to remote code execution, allowing attackers to run arbitrary PHP code on the server. The affected versions are all up to and including 1.4.5. The vulnerability is classified as a Local File Inclusion (LFI) in the description but the title and nature suggest Remote File Inclusion (RFI), which is more severe. No CVSS score has been assigned yet, and no known exploits are reported in the wild. The vulnerability was reserved in March 2025 and published in April 2025. The lack of patch links indicates that a fix may not yet be publicly available. This vulnerability is critical because it allows unauthenticated attackers to execute arbitrary code remotely, potentially leading to full system compromise. The attack vector is typically via HTTP requests with manipulated parameters that control file inclusion paths. The vulnerability affects applications that use the Hossein Material Dashboard in PHP environments, which are common in web development worldwide.

Potential Impact

The impact of CVE-2025-31014 is significant for organizations using the Hossein Material Dashboard in their PHP web applications. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands, deploy malware, steal sensitive data, or pivot within the network. This compromises confidentiality, integrity, and availability of the affected systems. Web servers hosting vulnerable dashboards can be fully compromised, leading to data breaches, defacement, or service disruption. The vulnerability can also be leveraged to establish persistent backdoors or launch further attacks against internal infrastructure. Organizations relying on this dashboard for critical business functions or handling sensitive user data face heightened risks of operational disruption and reputational damage. Given the ease of exploitation without authentication and the widespread use of PHP dashboards, the threat is considerable for a broad range of industries including finance, healthcare, education, and government services.

Mitigation Recommendations

To mitigate CVE-2025-31014, organizations should: 1) Monitor for and apply any official patches or updates released by the Hossein Material Dashboard maintainers promptly. 2) Implement strict input validation and sanitization on all parameters that influence file inclusion paths, ensuring only allowed, fixed filenames or whitelisted paths are accepted. 3) Disable remote file inclusion in PHP configurations by setting 'allow_url_include' to 'Off' and 'allow_url_fopen' to 'Off' where feasible. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious file inclusion attempts and malicious payloads. 5) Conduct code reviews and security testing to identify and remediate similar inclusion vulnerabilities in custom code. 6) Restrict file permissions on web servers to limit the impact of any successful code execution. 7) Monitor logs for unusual requests or errors related to file inclusion. 8) Consider isolating or containerizing applications to limit lateral movement in case of compromise. These steps go beyond generic advice by focusing on configuration hardening, proactive detection, and secure coding practices specific to file inclusion vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:23:06.940Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd733be6bfc5ba1def0e99

Added to database: 4/1/2026, 7:34:19 PM

Last enriched: 4/2/2026, 12:51:40 AM

Last updated: 4/4/2026, 3:06:46 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses