Skip to main content

CVE-2025-39383: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Code Work Web Xews Lite

Medium
Published: Thu Apr 24 2025 (04/24/2025, 16:08:36 UTC)
Source: CVE
Vendor/Project: Code Work Web
Product: Xews Lite

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Code Work Web Xews Lite allows PHP Local File Inclusion. This issue affects Xews Lite: from n/a through 1.0.9.

AI-Powered Analysis

AILast updated: 06/24/2025, 11:40:05 UTC

Technical Analysis

CVE-2025-39383 is a vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Code Work Web product 'Xews Lite' up to version 1.0.9. The flaw allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter used in PHP include or require statements to include unintended files from the local filesystem. This can lead to unauthorized disclosure of sensitive files, execution of arbitrary PHP code if combined with other vulnerabilities or file upload mechanisms, and potentially full system compromise. The vulnerability arises because the application does not properly validate or sanitize user input controlling the filename, enabling attackers to traverse directories or specify arbitrary local files. Although the vulnerability is described as a remote file inclusion type, the technical details specify local file inclusion, indicating that remote file inclusion may not be directly exploitable without additional conditions. No patches or fixes have been published at the time of disclosure, and no known exploits are currently observed in the wild. The vulnerability was reserved and published in April 2025, with enrichment from CISA, indicating recognition by US cybersecurity authorities. The affected product, Xews Lite, is a PHP-based web application or framework component developed by Code Work Web, likely used for web content management or related functions. The lack of a CVSS score and absence of known exploits suggest the vulnerability is of medium severity, but it still poses a significant risk due to the potential for sensitive file disclosure and code execution in web-facing environments.

Potential Impact

For European organizations using Xews Lite, this vulnerability could lead to unauthorized access to sensitive configuration files, credentials, or application source code, undermining confidentiality. If attackers can chain this LFI with other vulnerabilities, they may achieve remote code execution, impacting integrity and availability by modifying application behavior or causing denial of service. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on PHP-based web applications are particularly at risk. The vulnerability could facilitate lateral movement within networks or data exfiltration, especially if the affected systems have elevated privileges or access to sensitive data. Given that Xews Lite is a niche product, the overall impact depends on its adoption within European enterprises; however, any exploitation could damage organizational reputation and lead to regulatory penalties under GDPR if personal data is exposed.

Mitigation Recommendations

1. Immediate code review and implementation of strict input validation and sanitization for all parameters used in include or require statements to prevent directory traversal or arbitrary file inclusion. 2. Employ whitelisting of allowable filenames or paths rather than blacklisting to ensure only intended files are included. 3. Restrict PHP configuration settings such as 'allow_url_include' to 'Off' to prevent remote file inclusion vectors. 4. Implement web application firewalls (WAFs) with rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns. 5. Conduct thorough security testing, including static code analysis and penetration testing focused on file inclusion vulnerabilities. 6. Monitor web server and application logs for anomalous access patterns indicative of exploitation attempts. 7. Segregate and limit file system permissions for the web server user to minimize the impact of file inclusion vulnerabilities. 8. Engage with the vendor (Code Work Web) for official patches or updates and apply them promptly once available. 9. If feasible, consider replacing or isolating Xews Lite components in critical environments until the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:22:35.637Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf05ae

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/24/2025, 11:40:05 AM

Last updated: 7/29/2025, 4:16:06 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats