Skip to main content

CVE-2025-46454: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in svil4ok Meta Keywords & Description

High
VulnerabilityCVE-2025-46454cvecve-2025-46454cwe-98
Published: Fri May 23 2025 (05/23/2025, 12:43:46 UTC)
Source: CVE
Vendor/Project: svil4ok
Product: Meta Keywords & Description

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in svil4ok Meta Keywords & Description allows PHP Local File Inclusion. This issue affects Meta Keywords & Description: from n/a through 0.8.

AI-Powered Analysis

AILast updated: 07/08/2025, 23:41:22 UTC

Technical Analysis

CVE-2025-46454 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the 'Meta Keywords & Description' product by svil4ok. The flaw allows for PHP Local File Inclusion (LFI), a subset of Remote File Inclusion (RFI) vulnerabilities, where an attacker can manipulate the filename parameter used in PHP's include or require functions. This manipulation can lead to the inclusion and execution of arbitrary files on the server. Although the product version affected is not explicitly stated (noted as 'n/a'), the vulnerability impacts versions up to 0.8. The CVSS 3.1 score is 7.5, indicating a high severity with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network (AV:N), but requires high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability arises from insufficient validation or sanitization of user-supplied input used in file inclusion statements, allowing attackers to include unintended files, potentially leading to code execution, data disclosure, or denial of service. No known exploits are reported in the wild yet, and no patches are currently linked, indicating that mitigation may require vendor updates or manual code review and hardening.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using the affected 'Meta Keywords & Description' PHP component within their web infrastructure. Successful exploitation could lead to unauthorized disclosure of sensitive data, including configuration files, credentials, or customer information, severely impacting confidentiality. Integrity could be compromised by executing arbitrary code, potentially allowing attackers to alter website content, inject malware, or pivot within the network. Availability may also be affected if the attacker causes application crashes or resource exhaustion. Given the remote attack vector and lack of required privileges, attackers could exploit this vulnerability without authentication, though user interaction is necessary, possibly through social engineering or crafted URLs. The high attack complexity somewhat limits mass exploitation but targeted attacks against high-value European entities remain a concern. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often rely on PHP-based web applications, could face reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify if they use the 'Meta Keywords & Description' product by svil4ok, particularly versions up to 0.8. Immediate steps include: 1) Applying any vendor-provided patches or updates once available. 2) If patches are unavailable, perform a thorough code audit focusing on all include/require statements to ensure filenames are strictly validated and sanitized, disallowing user-controlled input or restricting it to a whitelist of safe files. 3) Implement web application firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities, including suspicious URL patterns or parameters. 4) Employ input validation and output encoding best practices throughout the application. 5) Monitor logs for unusual access patterns or errors indicative of attempted file inclusion attacks. 6) Educate users and administrators about the risks of clicking on untrusted links to reduce the likelihood of successful user interaction exploitation. 7) Consider isolating or sandboxing PHP applications to limit the impact of potential code execution. These measures collectively reduce the attack surface and improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-24T14:22:30.736Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a2492723bd

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 11:41:22 PM

Last updated: 7/30/2025, 4:09:28 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats