Skip to main content

CVE-2025-46468: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WPFable Fable Extra

Critical
VulnerabilityCVE-2025-46468cvecve-2025-46468cwe-98
Published: Fri May 23 2025 (05/23/2025, 12:43:43 UTC)
Source: CVE
Vendor/Project: WPFable
Product: Fable Extra

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WPFable Fable Extra allows PHP Local File Inclusion. This issue affects Fable Extra: from n/a through 1.0.6.

AI-Powered Analysis

AILast updated: 07/08/2025, 23:13:06 UTC

Technical Analysis

CVE-2025-46468 is a critical vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the WPFable Fable Extra plugin, versions up to 1.0.6. The flaw allows an attacker to perform a Remote File Inclusion (RFI) attack, which can lead to Local File Inclusion (LFI) exploitation. This occurs because the application does not properly validate or sanitize user-supplied input that determines which files are included or required by the PHP code. As a result, an attacker can manipulate the input to include arbitrary files from the local server or potentially remote servers if remote file inclusion is enabled, leading to execution of malicious code. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely over the network without any authentication or user interaction. The impact includes full compromise of confidentiality, integrity, and availability of the affected system, as attackers can execute arbitrary PHP code, access sensitive files, modify data, or disrupt service. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make this a significant threat. The vulnerability is present in the WPFable Fable Extra plugin, commonly used in WordPress environments, which are often targeted due to their widespread use and web-facing nature.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially for those relying on WordPress sites with the WPFable Fable Extra plugin installed. Successful exploitation could lead to full server compromise, data breaches involving personal or sensitive information protected under GDPR, defacement of websites, or use of compromised servers as launchpads for further attacks. The critical CVSS score indicates that attackers can exploit this remotely without credentials, increasing the risk of widespread automated attacks. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often handle sensitive data and have regulatory compliance obligations, could face significant operational disruption, reputational damage, and legal consequences. Additionally, the ability to execute arbitrary code could allow attackers to implant persistent backdoors, conduct lateral movement, or exfiltrate data over extended periods. Given the plugin’s integration in web-facing applications, the attack surface is broad, and the impact on availability could affect business continuity.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately identify and inventory all instances of the WPFable Fable Extra plugin in their environments. Since no patch links are currently available, organizations should consider the following specific actions: 1) Temporarily disable or remove the Fable Extra plugin until a vendor patch or update is released. 2) Implement strict input validation and sanitization on any user inputs that influence file inclusion paths, ensuring only expected and safe files can be included. 3) Configure PHP settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off') to reduce risk. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious include/require patterns or attempts to exploit file inclusion vulnerabilities. 5) Monitor web server and application logs for unusual requests or errors indicative of exploitation attempts. 6) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities. 7) Once a patch is released by WPFable, prioritize prompt testing and deployment to all affected systems. 8) Educate development and operations teams about secure coding practices related to file inclusion to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-24T14:22:38.654Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a2492723d4

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 11:13:06 PM

Last updated: 8/18/2025, 6:29:59 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats