CVE-2025-46468: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WPFable Fable Extra
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WPFable Fable Extra allows PHP Local File Inclusion. This issue affects Fable Extra: from n/a through 1.0.6.
AI Analysis
Technical Summary
CVE-2025-46468 is a critical vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the WPFable Fable Extra plugin, versions up to 1.0.6. The flaw allows an attacker to perform a Remote File Inclusion (RFI) attack, which can lead to Local File Inclusion (LFI) exploitation. This occurs because the application does not properly validate or sanitize user-supplied input that determines which files are included or required by the PHP code. As a result, an attacker can manipulate the input to include arbitrary files from the local server or potentially remote servers if remote file inclusion is enabled, leading to execution of malicious code. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely over the network without any authentication or user interaction. The impact includes full compromise of confidentiality, integrity, and availability of the affected system, as attackers can execute arbitrary PHP code, access sensitive files, modify data, or disrupt service. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make this a significant threat. The vulnerability is present in the WPFable Fable Extra plugin, commonly used in WordPress environments, which are often targeted due to their widespread use and web-facing nature.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for those relying on WordPress sites with the WPFable Fable Extra plugin installed. Successful exploitation could lead to full server compromise, data breaches involving personal or sensitive information protected under GDPR, defacement of websites, or use of compromised servers as launchpads for further attacks. The critical CVSS score indicates that attackers can exploit this remotely without credentials, increasing the risk of widespread automated attacks. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often handle sensitive data and have regulatory compliance obligations, could face significant operational disruption, reputational damage, and legal consequences. Additionally, the ability to execute arbitrary code could allow attackers to implant persistent backdoors, conduct lateral movement, or exfiltrate data over extended periods. Given the plugin’s integration in web-facing applications, the attack surface is broad, and the impact on availability could affect business continuity.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately identify and inventory all instances of the WPFable Fable Extra plugin in their environments. Since no patch links are currently available, organizations should consider the following specific actions: 1) Temporarily disable or remove the Fable Extra plugin until a vendor patch or update is released. 2) Implement strict input validation and sanitization on any user inputs that influence file inclusion paths, ensuring only expected and safe files can be included. 3) Configure PHP settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off') to reduce risk. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious include/require patterns or attempts to exploit file inclusion vulnerabilities. 5) Monitor web server and application logs for unusual requests or errors indicative of exploitation attempts. 6) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities. 7) Once a patch is released by WPFable, prioritize prompt testing and deployment to all affected systems. 8) Educate development and operations teams about secure coding practices related to file inclusion to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-46468: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WPFable Fable Extra
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WPFable Fable Extra allows PHP Local File Inclusion. This issue affects Fable Extra: from n/a through 1.0.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-46468 is a critical vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the WPFable Fable Extra plugin, versions up to 1.0.6. The flaw allows an attacker to perform a Remote File Inclusion (RFI) attack, which can lead to Local File Inclusion (LFI) exploitation. This occurs because the application does not properly validate or sanitize user-supplied input that determines which files are included or required by the PHP code. As a result, an attacker can manipulate the input to include arbitrary files from the local server or potentially remote servers if remote file inclusion is enabled, leading to execution of malicious code. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely over the network without any authentication or user interaction. The impact includes full compromise of confidentiality, integrity, and availability of the affected system, as attackers can execute arbitrary PHP code, access sensitive files, modify data, or disrupt service. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make this a significant threat. The vulnerability is present in the WPFable Fable Extra plugin, commonly used in WordPress environments, which are often targeted due to their widespread use and web-facing nature.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for those relying on WordPress sites with the WPFable Fable Extra plugin installed. Successful exploitation could lead to full server compromise, data breaches involving personal or sensitive information protected under GDPR, defacement of websites, or use of compromised servers as launchpads for further attacks. The critical CVSS score indicates that attackers can exploit this remotely without credentials, increasing the risk of widespread automated attacks. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often handle sensitive data and have regulatory compliance obligations, could face significant operational disruption, reputational damage, and legal consequences. Additionally, the ability to execute arbitrary code could allow attackers to implant persistent backdoors, conduct lateral movement, or exfiltrate data over extended periods. Given the plugin’s integration in web-facing applications, the attack surface is broad, and the impact on availability could affect business continuity.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately identify and inventory all instances of the WPFable Fable Extra plugin in their environments. Since no patch links are currently available, organizations should consider the following specific actions: 1) Temporarily disable or remove the Fable Extra plugin until a vendor patch or update is released. 2) Implement strict input validation and sanitization on any user inputs that influence file inclusion paths, ensuring only expected and safe files can be included. 3) Configure PHP settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off') to reduce risk. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious include/require patterns or attempts to exploit file inclusion vulnerabilities. 5) Monitor web server and application logs for unusual requests or errors indicative of exploitation attempts. 6) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities. 7) Once a patch is released by WPFable, prioritize prompt testing and deployment to all affected systems. 8) Educate development and operations teams about secure coding practices related to file inclusion to prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-24T14:22:38.654Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a2492723d4
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 11:13:06 PM
Last updated: 8/18/2025, 6:29:59 AM
Views: 17
Related Threats
CVE-2025-43733: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-43731: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-7693: CWE-20: Improper Input Validation in Rockwell Automation PLC - Micro850 L50E
CriticalCVE-2025-55293: CWE-287: Improper Authentication in meshtastic firmware
CriticalCVE-2025-55300: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in komari-monitor komari
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.