Skip to main content

CVE-2025-39494: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Mikado-Themes Wilmër

High
VulnerabilityCVE-2025-39494cvecve-2025-39494cwe-98
Published: Fri May 23 2025 (05/23/2025, 12:43:54 UTC)
Source: CVE
Vendor/Project: Mikado-Themes
Product: Wilmër

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Wilmër allows PHP Local File Inclusion. This issue affects Wilmër: from n/a through n/a.

AI-Powered Analysis

AILast updated: 07/09/2025, 00:09:46 UTC

Technical Analysis

CVE-2025-39494 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Mikado-Themes Wilmër product, a PHP-based theme or framework component. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack, which can lead to the inclusion and execution of arbitrary files on the server. Although the description mentions 'PHP Remote File Inclusion,' the actual impact is local file inclusion, meaning the attacker can potentially access sensitive files on the server or execute malicious code by including crafted files. The vulnerability is exploitable remotely over the network (AV:N), but requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker could fully compromise the affected system, leading to data leakage, code execution, and service disruption. No specific affected versions are listed, which suggests the vulnerability may affect all current versions of Wilmër until patched. No patches or known exploits in the wild are reported yet. The vulnerability was published on May 23, 2025, and assigned a CVSS 3.1 score of 8.1, indicating a serious threat that requires prompt attention.

Potential Impact

For European organizations using Mikado-Themes Wilmër, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data, including configuration files, credentials, or personal data protected under GDPR. The ability to execute arbitrary code on web servers could enable attackers to establish persistent backdoors, pivot within internal networks, or disrupt services, impacting business continuity. Given the high confidentiality, integrity, and availability impacts, organizations could face regulatory penalties, reputational damage, and operational downtime. The remote exploitability without authentication increases the risk of widespread attacks, especially targeting websites or applications built with Wilmër themes. This is particularly critical for sectors like finance, healthcare, and government within Europe, where data protection and service availability are paramount.

Mitigation Recommendations

Organizations should immediately audit their web applications to identify the use of Mikado-Themes Wilmër. Since no patches are currently available, temporary mitigations include disabling or restricting the use of dynamic include/require statements in PHP code, employing web application firewalls (WAFs) to detect and block suspicious requests attempting file inclusion, and implementing strict input validation and sanitization on any user-supplied parameters that influence file paths. Additionally, restricting PHP file system permissions to limit access to sensitive files can reduce the impact of exploitation. Monitoring web server logs for unusual access patterns or error messages related to file inclusion attempts is advised. Organizations should maintain close contact with the vendor for patch releases and apply updates promptly once available. Conducting penetration testing focused on file inclusion vulnerabilities can help identify exposure and validate mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:23:58.700Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a24927237f

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/9/2025, 12:09:46 AM

Last updated: 7/30/2025, 4:09:29 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats