Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-39466: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Mikado-Themes Dør

0
Critical
VulnerabilityCVE-2025-39466cvecve-2025-39466
Published: Thu Nov 06 2025 (11/06/2025, 15:53:30 UTC)
Source: CVE Database V5
Vendor/Project: Mikado-Themes
Product: Dør

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Dør dor allows PHP Local File Inclusion.This issue affects Dør: from n/a through <= 2.4.

AI-Powered Analysis

AILast updated: 11/13/2025, 16:10:17 UTC

Technical Analysis

CVE-2025-39466 is a critical Remote File Inclusion (RFI) vulnerability found in Mikado-Themes' Dør product, affecting versions up to and including 2.4. The vulnerability stems from improper control over the filename parameter used in PHP include or require statements, which allows an attacker to supply a remote file path. When exploited, this enables the attacker to execute arbitrary PHP code hosted on a remote server within the context of the vulnerable web application. This type of vulnerability is particularly dangerous because it requires no authentication or user interaction, and can lead to full system compromise, including data theft, website defacement, or deployment of malware. The CVSS 3.1 base score of 9.8 reflects the vulnerability's ease of exploitation (network vector, low attack complexity), lack of required privileges or user interaction, and its impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability is publicly disclosed and classified as critical, warranting immediate attention. The vulnerability affects PHP-based web environments using the Dør theme, which is commonly deployed in WordPress or similar CMS platforms. Attackers could leverage this flaw to execute remote code, pivot within internal networks, or establish persistent backdoors. The lack of available patches at the time of disclosure increases the urgency for temporary mitigations and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-39466 could be severe. Exploitation can lead to unauthorized remote code execution, allowing attackers to compromise web servers, access sensitive data, manipulate website content, or disrupt services. This could result in data breaches, loss of customer trust, regulatory penalties under GDPR, and operational downtime. Organizations relying on Mikado-Themes' Dør theme for their websites or web applications are particularly vulnerable. Given the critical nature of the vulnerability and the widespread use of PHP-based CMS platforms in Europe, attackers could target sectors such as e-commerce, government portals, healthcare, and financial services. The ability to execute arbitrary code remotely without authentication makes this vulnerability a prime candidate for automated exploitation campaigns, potentially leading to widespread compromise across European digital infrastructure.

Mitigation Recommendations

1. Immediately identify and inventory all instances of the Mikado-Themes Dør product in your environment. 2. Apply any available patches or updates from Mikado-Themes as soon as they are released. 3. If patches are not yet available, implement temporary mitigations such as disabling allow_url_include and allow_url_fopen directives in the PHP configuration to prevent remote file inclusion. 4. Employ web application firewalls (WAFs) with rules specifically designed to detect and block attempts to exploit file inclusion vulnerabilities. 5. Conduct thorough input validation and sanitization on all user-supplied parameters that influence file inclusion or require/include statements. 6. Monitor web server and application logs for suspicious requests containing remote URLs or unusual file paths. 7. Restrict web server permissions to limit the execution context and prevent unauthorized file writes or modifications. 8. Educate development and operations teams about secure coding practices to avoid similar vulnerabilities in the future. 9. Consider isolating vulnerable web applications in segmented network zones to reduce lateral movement risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:23:36.340Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc7c9ca26fb4dd2f57a34

Added to database: 11/6/2025, 4:07:37 PM

Last enriched: 11/13/2025, 4:10:17 PM

Last updated: 11/22/2025, 7:05:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats