Skip to main content

CVE-2025-46444: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in scripteo Ads Pro Plugin

High
VulnerabilityCVE-2025-46444cvecve-2025-46444cwe-98
Published: Fri May 23 2025 (05/23/2025, 12:43:47 UTC)
Source: CVE
Vendor/Project: scripteo
Product: Ads Pro Plugin

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in scripteo Ads Pro Plugin allows PHP Local File Inclusion. This issue affects Ads Pro Plugin: from n/a through 4.88.

AI-Powered Analysis

AILast updated: 07/08/2025, 23:40:45 UTC

Technical Analysis

CVE-2025-46444 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. This specific vulnerability affects the scripteo Ads Pro Plugin, a tool commonly used for managing advertisements on websites. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that the plugin uses in its include or require statements. Although the description mentions 'PHP Remote File Inclusion,' the actual issue is a Local File Inclusion, meaning the attacker can include files from the local server rather than remotely hosted files. This can lead to arbitrary code execution, disclosure of sensitive files, and potentially full system compromise. The vulnerability is exploitable remotely without authentication (AV:N/PR:N/UI:N), but requires high attack complexity (AC:H), indicating that exploitation is not trivial but feasible under certain conditions. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions are not explicitly stated beyond 'n/a through 4.88,' suggesting all versions up to 4.88 are vulnerable. The vulnerability arises because the plugin does not properly validate or sanitize the input controlling the filename in include/require statements, allowing attackers to traverse directories or include unintended files. This can lead to disclosure of configuration files, source code, or execution of malicious PHP code if an attacker can upload files to the server or leverage other vulnerabilities in conjunction.

Potential Impact

For European organizations using the scripteo Ads Pro Plugin, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data such as configuration files, credentials, or user data, violating GDPR and other data protection regulations. Integrity of website content and backend systems could be compromised, allowing attackers to inject malicious code, deface websites, or pivot to internal networks. Availability could also be affected if attackers execute denial-of-service payloads or disrupt normal operations. Given the plugin’s role in managing advertisements, exploitation could also lead to fraudulent ad placements or redirection to malicious sites, damaging brand reputation and causing financial losses. The lack of authentication requirement means attackers can attempt exploitation remotely, increasing the threat surface. The high attack complexity somewhat limits mass exploitation but targeted attacks against high-value European organizations remain a concern. The absence of known exploits in the wild suggests the vulnerability is newly disclosed, but proactive mitigation is critical to prevent future attacks.

Mitigation Recommendations

European organizations should immediately audit their web environments to identify installations of the scripteo Ads Pro Plugin, particularly versions up to 4.88. Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict web server permissions to limit access to sensitive files and directories, minimizing the impact of LFI. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious include/require parameter manipulations indicative of LFI attempts. 3) Disable or restrict PHP functions that facilitate file inclusion or execution where possible, such as 'include', 'require', 'include_once', and 'require_once', or use PHP configuration directives like open_basedir to limit accessible directories. 4) Conduct thorough input validation and sanitization on all user-controllable parameters, especially those related to file paths. 5) Monitor web server logs for unusual requests targeting the vulnerable plugin endpoints. 6) Consider temporarily disabling or removing the Ads Pro Plugin if it is not critical to operations until a secure version is available. 7) Prepare to apply patches promptly once released by the vendor. 8) Educate development and security teams about the risks of improper file inclusion and secure coding practices to prevent similar vulnerabilities in custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-24T14:22:16.421Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a2492723b7

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 11:40:45 PM

Last updated: 8/2/2025, 5:08:15 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats