Skip to main content

CVE-2025-32289: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ApusTheme Yozi

High
VulnerabilityCVE-2025-32289cvecve-2025-32289cwe-98
Published: Fri May 23 2025 (05/23/2025, 12:43:58 UTC)
Source: CVE
Vendor/Project: ApusTheme
Product: Yozi

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme Yozi allows PHP Local File Inclusion. This issue affects Yozi: from n/a through 2.0.52.

AI-Powered Analysis

AILast updated: 07/08/2025, 23:57:23 UTC

Technical Analysis

CVE-2025-32289 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the ApusTheme Yozi product, versions up to 2.0.52. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP include or require statements to execute arbitrary local files on the server. This can lead to remote code execution if the attacker can control or upload files to the server, or disclose sensitive information by including configuration files or logs. The vulnerability is exploitable remotely over the network without authentication or user interaction, but requires high attack complexity, indicating some non-trivial conditions must be met for successful exploitation. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. The vulnerability is currently published but no known exploits in the wild have been reported yet. No patches or fixes have been linked, so affected users must be vigilant. The root cause is insufficient validation or sanitization of input controlling the filename in PHP include/require statements, allowing attackers to traverse directories or specify unintended files. This type of vulnerability is critical in web applications and themes that rely on PHP for dynamic content inclusion, as it can lead to full system compromise if exploited.

Potential Impact

For European organizations using ApusTheme Yozi, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data, including configuration files, credentials, or user data, violating GDPR and other data protection regulations. Integrity of web applications could be compromised, allowing attackers to inject malicious code or backdoors, potentially leading to persistent access and lateral movement within networks. Availability could also be affected if attackers execute destructive payloads or disrupt services. Organizations in sectors with high web presence such as e-commerce, government, education, and media are particularly at risk. The lack of authentication requirement means attackers can attempt exploitation remotely, increasing the attack surface. The high attack complexity somewhat mitigates immediate widespread exploitation but does not eliminate risk, especially from skilled threat actors. The absence of known exploits in the wild currently provides a window for remediation before active attacks emerge. However, the potential impact on confidentiality, integrity, and availability is severe, making timely mitigation critical to avoid regulatory penalties and reputational damage.

Mitigation Recommendations

1. Immediate mitigation should include auditing all instances of ApusTheme Yozi and identifying affected versions (up to 2.0.52). 2. If possible, disable or restrict the functionality that allows dynamic inclusion of files via user input. 3. Implement strict input validation and sanitization on any parameters controlling file inclusion, enforcing whitelist approaches and disallowing directory traversal sequences. 4. Employ web application firewalls (WAFs) with rules designed to detect and block LFI attempts targeting PHP include/require statements. 5. Monitor web server and application logs for suspicious requests attempting to exploit file inclusion. 6. Segregate and harden web server file permissions to limit the files accessible by the web application user, preventing inclusion of sensitive files. 7. Where feasible, isolate the affected application in a sandboxed environment to reduce impact. 8. Engage with ApusTheme or community channels for patches or updates addressing this vulnerability and apply them promptly once available. 9. Conduct penetration testing focused on file inclusion vulnerabilities to verify mitigation effectiveness. 10. Educate developers and administrators on secure coding practices related to file inclusion in PHP to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-04T10:02:38.419Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a249272360

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 11:57:23 PM

Last updated: 7/30/2025, 4:09:41 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats