Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32672: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in g5theme Ultimate Bootstrap Elements for Elementor

0
Unknown
VulnerabilityCVE-2025-32672cvecve-2025-32672
Published: Fri Apr 11 2025 (04/11/2025, 08:43:02 UTC)
Source: CVE Database V5
Vendor/Project: g5theme
Product: Ultimate Bootstrap Elements for Elementor

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in g5theme Ultimate Bootstrap Elements for Elementor ultimate-bootstrap-elements-for-elementor allows PHP Local File Inclusion.This issue affects Ultimate Bootstrap Elements for Elementor: from n/a through <= 1.4.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 03:48:47 UTC

Technical Analysis

CVE-2025-32672 is a Local File Inclusion (LFI) vulnerability found in the Ultimate Bootstrap Elements for Elementor plugin developed by g5theme. This vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include unintended files from the server. The affected versions are all releases up to and including 1.4.9. LFI vulnerabilities can enable attackers to read sensitive files, such as configuration files or password stores, and in some cases, execute arbitrary code if combined with other vulnerabilities or misconfigurations. The flaw is due to insufficient validation or sanitization of user-supplied input that controls the file path in PHP functions. Although no public exploits have been reported yet, the vulnerability is critical because it can be exploited remotely without authentication, depending on the plugin's exposure. The plugin is widely used in WordPress environments to enhance Elementor page builder functionality, making many websites potentially vulnerable. The absence of a CVSS score means severity must be estimated based on the nature of the vulnerability, its impact on confidentiality, integrity, and availability, and the ease of exploitation. Given the potential for remote code execution or sensitive data exposure, this vulnerability is serious and requires immediate attention from site administrators and developers.

Potential Impact

The impact of CVE-2025-32672 can be significant for organizations running WordPress sites with the Ultimate Bootstrap Elements for Elementor plugin. Successful exploitation could lead to unauthorized disclosure of sensitive files such as configuration files, database credentials, or other critical data stored on the server. In worst-case scenarios, attackers might achieve remote code execution by including malicious files or chaining this vulnerability with others, leading to full server compromise. This can result in data breaches, defacement, malware distribution, or use of the compromised server as a pivot point for further attacks. The vulnerability affects the confidentiality, integrity, and availability of affected systems. Organizations relying on this plugin for their web presence, especially those handling sensitive user data or critical business operations, face increased risk of reputational damage, financial loss, and regulatory penalties. Since the plugin is used globally, the threat landscape is broad, and attackers may target high-value websites or those with weaker security postures.

Mitigation Recommendations

To mitigate CVE-2025-32672, organizations should immediately update the Ultimate Bootstrap Elements for Elementor plugin to a version that addresses this vulnerability once available. Until a patch is released, administrators should consider disabling or removing the plugin if feasible. Implement strict input validation and sanitization on any user-supplied data that controls file paths to prevent malicious manipulation. Employ web application firewalls (WAFs) with rules designed to detect and block LFI attack patterns targeting PHP include/require statements. Restrict PHP file inclusion paths using configuration directives such as open_basedir to limit accessible directories. Monitor server logs for suspicious file inclusion attempts or unusual access patterns. Conduct regular security audits and vulnerability scans to identify and remediate similar issues proactively. Additionally, ensure that file permissions on the server are properly configured to minimize the impact of any file inclusion attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-09T11:21:18.307Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd73ede6bfc5ba1def4179

Added to database: 4/1/2026, 7:37:17 PM

Last enriched: 4/2/2026, 3:48:47 AM

Last updated: 4/6/2026, 9:38:06 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses