Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-39570: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Lomu WPCOM Member

0
Unknown
VulnerabilityCVE-2025-39570cvecve-2025-39570
Published: Wed Apr 16 2025 (04/16/2025, 12:44:30 UTC)
Source: CVE Database V5
Vendor/Project: Lomu
Product: WPCOM Member

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Lomu WPCOM Member wpcom-member allows PHP Local File Inclusion.This issue affects WPCOM Member: from n/a through <= 1.7.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 11:54:48 UTC

Technical Analysis

CVE-2025-39570 identifies a Remote File Inclusion vulnerability in the Lomu WPCOM Member WordPress plugin versions up to 1.7.7. The vulnerability stems from improper validation and control of filenames used in PHP include or require statements, which can be manipulated by an attacker to include arbitrary local files on the server. This type of vulnerability allows attackers to execute malicious PHP code remotely by including crafted files, potentially leading to full system compromise. The vulnerability is categorized as PHP Local File Inclusion (LFI), but due to the nature of the flaw, it can be exploited remotely if the attacker can control the input to the include/require statements. No CVSS score is assigned yet, and no known exploits have been reported in the wild. The affected product, WPCOM Member, is a WordPress plugin used for membership management, which is widely deployed in various WordPress environments. The lack of patch links indicates that a fix may not yet be publicly available, increasing the urgency for mitigation. The vulnerability was published on April 16, 2025, by Patchstack, a known security research entity. The absence of CWE identifiers suggests the vulnerability is straightforward but critical in nature, involving insecure file inclusion practices common in PHP applications. This vulnerability can be exploited without authentication, increasing its risk profile. Attackers exploiting this flaw could execute arbitrary code, access sensitive files, or disrupt service availability.

Potential Impact

The potential impact of CVE-2025-39570 is significant for organizations using the vulnerable WPCOM Member plugin. Exploitation can lead to remote code execution, allowing attackers to run arbitrary PHP code on the affected server. This can result in full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks within an organization's network. Confidentiality is at risk due to possible unauthorized access to sensitive files. Integrity can be compromised by altering website content or injecting malicious scripts. Availability may be affected if attackers disrupt services or deploy ransomware. Given the widespread use of WordPress and the popularity of membership plugins, many organizations globally could be exposed, especially those that do not promptly update or secure their plugins. The lack of known exploits in the wild provides a window for proactive defense, but the ease of exploitation without authentication and the critical nature of remote code execution elevate the threat level. Organizations relying on this plugin for membership management, e-commerce, or community engagement face operational and reputational risks if exploited.

Mitigation Recommendations

To mitigate CVE-2025-39570, organizations should take the following specific actions: 1) Immediately audit all WordPress installations for the presence of the WPCOM Member plugin and identify versions at or below 1.7.7. 2) Monitor official sources and Patchstack for the release of security patches and apply them promptly once available. 3) In the absence of an official patch, implement strict input validation and sanitization on any user-controlled input that could influence file inclusion paths within the plugin. 4) Disable PHP's allow_url_include directive to prevent remote file inclusion if not already disabled. 5) Employ web application firewalls (WAFs) with rules targeting file inclusion attack patterns to block exploitation attempts. 6) Restrict file system permissions to limit the PHP process's access to only necessary directories, reducing the impact of any file inclusion. 7) Conduct regular security scans and penetration tests focusing on file inclusion vulnerabilities. 8) Educate development and operations teams about secure coding practices related to file inclusion and PHP configuration. 9) Consider temporarily disabling or replacing the plugin with a more secure alternative if patching is delayed. These targeted steps go beyond generic advice by focusing on the specific nature of the vulnerability and the plugin involved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:26:36.912Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74d8e6bfc5ba1df01327

Added to database: 4/1/2026, 7:41:12 PM

Last enriched: 4/2/2026, 11:54:48 AM

Last updated: 4/6/2026, 11:30:43 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses