Skip to main content

CVE-2025-32288: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in stmcan RT-Theme 18 | Extensions

High
VulnerabilityCVE-2025-32288cvecve-2025-32288cwe-98
Published: Thu Aug 14 2025 (08/14/2025, 10:34:27 UTC)
Source: CVE Database V5
Vendor/Project: stmcan
Product: RT-Theme 18 | Extensions

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in stmcan RT-Theme 18 | Extensions allows PHP Local File Inclusion. This issue affects RT-Theme 18 | Extensions: from n/a through 2.4.

AI-Powered Analysis

AILast updated: 08/14/2025, 12:18:10 UTC

Technical Analysis

CVE-2025-32288 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the stmcan RT-Theme 18 | Extensions product, versions up to 2.4. The issue allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter to include arbitrary files on the server. This can lead to the execution of malicious code, disclosure of sensitive information, or further compromise of the affected system. The vulnerability arises because the application does not properly validate or sanitize user-supplied input used in PHP include/require statements, enabling attackers to traverse directories or specify unintended files. The CVSS v3.1 score is 7.5, indicating a high severity with the vector AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, meaning the attack can be performed remotely over the network but requires high attack complexity and user interaction, with no privileges required. The impact affects confidentiality, integrity, and availability, as attackers can read sensitive files, modify application behavior, or cause denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet, so mitigation relies on secure coding practices and configuration hardening. Given the nature of the vulnerability, it is critical for organizations using RT-Theme 18 | Extensions to assess their exposure and apply mitigations promptly once patches become available.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those running websites or web applications based on the stmcan RT-Theme 18 | Extensions. Successful exploitation can lead to unauthorized disclosure of sensitive data such as configuration files, credentials, or personal data protected under GDPR, resulting in compliance violations and potential fines. Integrity of web applications can be compromised, allowing attackers to inject malicious scripts or backdoors, which can be leveraged for further attacks such as phishing or lateral movement within networks. Availability may also be impacted if attackers cause application crashes or denial of service. The high attack complexity and requirement for user interaction somewhat limit the ease of exploitation, but targeted phishing or social engineering campaigns could facilitate this. The lack of known exploits in the wild currently reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. Organizations in sectors with high web presence, such as e-commerce, media, and government services, are particularly at risk due to the potential reputational damage and operational disruption.

Mitigation Recommendations

1. Immediate mitigation should include auditing all instances of RT-Theme 18 | Extensions to identify affected versions and isolate vulnerable systems. 2. Implement strict input validation and sanitization on all user-supplied data that may influence include or require statements, employing whitelisting of allowed filenames or paths. 3. Use PHP configuration directives such as open_basedir to restrict file inclusion to safe directories. 4. Disable allow_url_include in PHP configuration to prevent remote file inclusion vectors. 5. Monitor web server logs and application logs for suspicious requests that attempt directory traversal or unusual file inclusion patterns. 6. Educate users and administrators about the risks of phishing or social engineering that could trigger user interaction needed for exploitation. 7. Once available, promptly apply official patches or updates from stmcan for RT-Theme 18 | Extensions. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block LFI attack patterns. 9. Conduct regular security assessments and code reviews focusing on file inclusion logic in PHP applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-04T10:02:38.419Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689dbee1ad5a09ad0059e590

Added to database: 8/14/2025, 10:48:01 AM

Last enriched: 8/14/2025, 12:18:10 PM

Last updated: 8/21/2025, 12:35:15 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats