Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-39466: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Mikado-Themes Dør

0
Critical
VulnerabilityCVE-2025-39466cvecve-2025-39466
Published: Thu Nov 06 2025 (11/06/2025, 15:53:30 UTC)
Source: CVE Database V5
Vendor/Project: Mikado-Themes
Product: Dør

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Dør dor allows PHP Local File Inclusion.This issue affects Dør: from n/a through <= 2.4.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:47:53 UTC

Technical Analysis

CVE-2025-39466 is a remote file inclusion (RFI) vulnerability in the Mikado-Themes Dør product, affecting versions up to and including 2.4. The vulnerability arises from improper control of the filename parameter used in PHP include or require statements, allowing an attacker to specify arbitrary files to be included and executed by the PHP interpreter. This flaw enables remote attackers to execute arbitrary PHP code on the affected server without authentication or user interaction. The vulnerability is classified as critical with a CVSS v3.1 score of 9.8, reflecting its ease of exploitation over the network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The issue stems from insecure coding practices where user-supplied input is not properly sanitized or validated before being used in file inclusion functions, leading to potential remote code execution. Although no known exploits are currently reported in the wild, the severity and nature of the vulnerability make it a prime target for attackers seeking to compromise web servers running vulnerable versions of Dør. The vulnerability affects PHP-based web applications using Mikado-Themes Dør, which is commonly used in content management and website theming. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.

Potential Impact

The impact of CVE-2025-39466 on European organizations is significant due to the potential for full system compromise via remote code execution. Attackers exploiting this vulnerability can gain unauthorized access to sensitive data, modify or delete critical files, and disrupt service availability. This can lead to data breaches, defacement of websites, and the use of compromised servers as pivot points for further attacks within corporate networks. Organizations relying on Mikado-Themes Dør for their web presence, especially those handling personal data under GDPR, face legal and reputational risks. The vulnerability's network-exploitable nature means attackers can launch attacks remotely without any prior access or user interaction, increasing the likelihood of widespread exploitation. Additionally, the criticality of the vulnerability may attract automated scanning and exploitation attempts, further elevating risk levels. European sectors such as e-commerce, government, and media, which often use PHP-based CMS and themes, are particularly vulnerable to operational disruptions and data loss.

Mitigation Recommendations

1. Immediate mitigation should focus on applying official patches or updates from Mikado-Themes once they become available to address the vulnerability. 2. Until patches are released, implement strict input validation and sanitization on all parameters used in include/require statements to prevent arbitrary file inclusion. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file inclusion attempts targeting the vulnerable parameter. 4. Restrict PHP configuration settings such as 'allow_url_include' to 'Off' to prevent remote file inclusion. 5. Use PHP open_basedir restrictions to limit the directories accessible by PHP scripts, reducing the risk of local file inclusion. 6. Conduct thorough code reviews to identify and remediate unsafe dynamic file inclusion patterns. 7. Monitor web server logs for unusual requests that may indicate exploitation attempts. 8. Educate development teams on secure coding practices to avoid similar vulnerabilities in the future. 9. Consider isolating vulnerable web applications in segmented network zones to limit potential lateral movement if compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:23:36.340Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc7c9ca26fb4dd2f57a34

Added to database: 11/6/2025, 4:07:37 PM

Last enriched: 1/20/2026, 7:47:53 PM

Last updated: 2/7/2026, 11:07:18 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats