Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-39468: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pantherius Modal Survey

0
Critical
VulnerabilityCVE-2025-39468cvecve-2025-39468
Published: Thu Nov 06 2025 (11/06/2025, 15:53:34 UTC)
Source: CVE Database V5
Vendor/Project: pantherius
Product: Modal Survey

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in pantherius Modal Survey modal-survey.This issue affects Modal Survey: from n/a through <= 2.0.2.0.1.

AI-Powered Analysis

AILast updated: 11/13/2025, 16:10:53 UTC

Technical Analysis

CVE-2025-39468 is a critical Remote File Inclusion (RFI) vulnerability found in the pantherius Modal Survey PHP application, specifically affecting versions up to and including 2.0.2.0.1. The vulnerability stems from improper control over the filename parameter used in PHP include or require statements, which allows an attacker to supply a remote URL or file path that the application will include and execute. This lack of input validation or sanitization enables unauthenticated attackers to execute arbitrary PHP code on the server remotely. The vulnerability is classified as critical with a CVSS v3.1 score of 9.8, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could lead to full system compromise, including data theft, defacement, or deployment of malware. Although no public exploits have been reported yet, the nature of RFI vulnerabilities and their historical exploitation patterns make this a high-risk issue. The vulnerability affects the Modal Survey product by pantherius, a PHP-based survey tool, which is commonly deployed in web environments. The improper control of include/require filenames is a classic PHP security flaw often mitigated by disabling allow_url_include in PHP configurations and implementing strict input validation. The vulnerability was reserved in April 2025 and published in November 2025, indicating recent discovery and disclosure. No patches or fixes are currently linked, so users must monitor vendor updates closely.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the potential for remote code execution without authentication. Attackers could leverage this flaw to gain unauthorized access to sensitive data, disrupt services, or pivot within the network to compromise additional systems. Organizations running Modal Survey on public-facing web servers are particularly vulnerable to exploitation, which could lead to data breaches involving personal or business-critical information. The impact extends to regulatory compliance, as breaches involving personal data could violate GDPR requirements, leading to legal and financial penalties. Additionally, compromised systems could be used as launchpads for further attacks, including ransomware or supply chain compromises. The availability of the affected application in various sectors such as marketing, customer feedback, and research increases the attack surface. The critical severity and ease of exploitation mean that attackers do not require sophisticated skills or insider access, increasing the likelihood of opportunistic attacks targeting European entities.

Mitigation Recommendations

Immediate mitigation steps include disabling the PHP configuration directive allow_url_include to prevent remote file inclusion via URLs. Organizations should implement strict input validation and sanitization on all parameters used in include or require statements, ensuring only trusted and local files are referenced. Employing web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts can provide additional protection. Monitoring logs for unusual include paths or remote file access attempts is critical for early detection. Until an official patch is released by pantherius, consider isolating or temporarily disabling the Modal Survey application if feasible. Conduct thorough code reviews to identify and remediate similar insecure coding patterns. Educate developers on secure PHP coding practices to prevent recurrence. Finally, maintain up-to-date backups and incident response plans to minimize damage in case of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:23:43.557Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc7caca26fb4dd2f57a3a

Added to database: 11/6/2025, 4:07:38 PM

Last enriched: 11/13/2025, 4:10:53 PM

Last updated: 11/22/2025, 8:21:22 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats