CVE-2025-46444: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in scripteo Ads Pro Plugin
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in scripteo Ads Pro Plugin allows PHP Local File Inclusion. This issue affects Ads Pro Plugin: from n/a through 4.88.
AI Analysis
Technical Summary
CVE-2025-46444 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. This specific vulnerability affects the scripteo Ads Pro Plugin, a tool commonly used for managing advertisements on websites. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that the plugin uses in its include or require statements. Although the description mentions 'PHP Remote File Inclusion,' the actual issue is a Local File Inclusion, meaning the attacker can include files from the local server rather than remotely hosted files. This can lead to arbitrary code execution, disclosure of sensitive files, and potentially full system compromise. The vulnerability is exploitable remotely without authentication (AV:N/PR:N/UI:N), but requires high attack complexity (AC:H), indicating that exploitation is not trivial but feasible under certain conditions. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions are not explicitly stated beyond 'n/a through 4.88,' suggesting all versions up to 4.88 are vulnerable. The vulnerability arises because the plugin does not properly validate or sanitize the input controlling the filename in include/require statements, allowing attackers to traverse directories or include unintended files. This can lead to disclosure of configuration files, source code, or execution of malicious PHP code if an attacker can upload files to the server or leverage other vulnerabilities in conjunction.
Potential Impact
For European organizations using the scripteo Ads Pro Plugin, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data such as configuration files, credentials, or user data, violating GDPR and other data protection regulations. Integrity of website content and backend systems could be compromised, allowing attackers to inject malicious code, deface websites, or pivot to internal networks. Availability could also be affected if attackers execute denial-of-service payloads or disrupt normal operations. Given the plugin’s role in managing advertisements, exploitation could also lead to fraudulent ad placements or redirection to malicious sites, damaging brand reputation and causing financial losses. The lack of authentication requirement means attackers can attempt exploitation remotely, increasing the threat surface. The high attack complexity somewhat limits mass exploitation but targeted attacks against high-value European organizations remain a concern. The absence of known exploits in the wild suggests the vulnerability is newly disclosed, but proactive mitigation is critical to prevent future attacks.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the scripteo Ads Pro Plugin, particularly versions up to 4.88. Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict web server permissions to limit access to sensitive files and directories, minimizing the impact of LFI. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious include/require parameter manipulations indicative of LFI attempts. 3) Disable or restrict PHP functions that facilitate file inclusion or execution where possible, such as 'include', 'require', 'include_once', and 'require_once', or use PHP configuration directives like open_basedir to limit accessible directories. 4) Conduct thorough input validation and sanitization on all user-controllable parameters, especially those related to file paths. 5) Monitor web server logs for unusual requests targeting the vulnerable plugin endpoints. 6) Consider temporarily disabling or removing the Ads Pro Plugin if it is not critical to operations until a secure version is available. 7) Prepare to apply patches promptly once released by the vendor. 8) Educate development and security teams about the risks of improper file inclusion and secure coding practices to prevent similar vulnerabilities in custom code.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-46444: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in scripteo Ads Pro Plugin
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in scripteo Ads Pro Plugin allows PHP Local File Inclusion. This issue affects Ads Pro Plugin: from n/a through 4.88.
AI-Powered Analysis
Technical Analysis
CVE-2025-46444 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. This specific vulnerability affects the scripteo Ads Pro Plugin, a tool commonly used for managing advertisements on websites. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that the plugin uses in its include or require statements. Although the description mentions 'PHP Remote File Inclusion,' the actual issue is a Local File Inclusion, meaning the attacker can include files from the local server rather than remotely hosted files. This can lead to arbitrary code execution, disclosure of sensitive files, and potentially full system compromise. The vulnerability is exploitable remotely without authentication (AV:N/PR:N/UI:N), but requires high attack complexity (AC:H), indicating that exploitation is not trivial but feasible under certain conditions. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions are not explicitly stated beyond 'n/a through 4.88,' suggesting all versions up to 4.88 are vulnerable. The vulnerability arises because the plugin does not properly validate or sanitize the input controlling the filename in include/require statements, allowing attackers to traverse directories or include unintended files. This can lead to disclosure of configuration files, source code, or execution of malicious PHP code if an attacker can upload files to the server or leverage other vulnerabilities in conjunction.
Potential Impact
For European organizations using the scripteo Ads Pro Plugin, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data such as configuration files, credentials, or user data, violating GDPR and other data protection regulations. Integrity of website content and backend systems could be compromised, allowing attackers to inject malicious code, deface websites, or pivot to internal networks. Availability could also be affected if attackers execute denial-of-service payloads or disrupt normal operations. Given the plugin’s role in managing advertisements, exploitation could also lead to fraudulent ad placements or redirection to malicious sites, damaging brand reputation and causing financial losses. The lack of authentication requirement means attackers can attempt exploitation remotely, increasing the threat surface. The high attack complexity somewhat limits mass exploitation but targeted attacks against high-value European organizations remain a concern. The absence of known exploits in the wild suggests the vulnerability is newly disclosed, but proactive mitigation is critical to prevent future attacks.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the scripteo Ads Pro Plugin, particularly versions up to 4.88. Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict web server permissions to limit access to sensitive files and directories, minimizing the impact of LFI. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious include/require parameter manipulations indicative of LFI attempts. 3) Disable or restrict PHP functions that facilitate file inclusion or execution where possible, such as 'include', 'require', 'include_once', and 'require_once', or use PHP configuration directives like open_basedir to limit accessible directories. 4) Conduct thorough input validation and sanitization on all user-controllable parameters, especially those related to file paths. 5) Monitor web server logs for unusual requests targeting the vulnerable plugin endpoints. 6) Consider temporarily disabling or removing the Ads Pro Plugin if it is not critical to operations until a secure version is available. 7) Prepare to apply patches promptly once released by the vendor. 8) Educate development and security teams about the risks of improper file inclusion and secure coding practices to prevent similar vulnerabilities in custom code.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-24T14:22:16.421Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a2492723b7
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 11:40:45 PM
Last updated: 8/2/2025, 5:08:15 PM
Views: 17
Related Threats
CVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighResearchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
HighCVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.