Skip to main content

CVE-2025-47496: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PublishPress PublishPress Authors

High
VulnerabilityCVE-2025-47496cvecve-2025-47496cwe-98
Published: Wed May 07 2025 (05/07/2025, 14:19:54 UTC)
Source: CVE
Vendor/Project: PublishPress
Product: PublishPress Authors

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PublishPress PublishPress Authors allows PHP Local File Inclusion. This issue affects PublishPress Authors: from n/a through 4.7.5.

AI-Powered Analysis

AILast updated: 07/05/2025, 12:27:34 UTC

Technical Analysis

CVE-2025-47496 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the PublishPress Authors plugin, versions up to and including 4.7.5. The flaw allows for PHP Remote File Inclusion (RFI), enabling an attacker to manipulate the filename parameter used in PHP include or require functions to load arbitrary files. This can lead to Local File Inclusion (LFI) or potentially Remote File Inclusion, depending on server configuration and input sanitization. Exploiting this vulnerability can allow an attacker to execute arbitrary PHP code on the affected server, leading to full compromise of the web application environment. The CVSS v3.1 base score is 7.5, indicating a high severity with network attack vector, high complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for organizations using the PublishPress Authors plugin in their WordPress environments. The lack of available patches at the time of publication further increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the PublishPress Authors plugin for content management and author attribution. Successful exploitation could lead to unauthorized code execution, data breaches involving sensitive user or business information, website defacement, or complete service disruption. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and incur financial losses from remediation and downtime. Given the widespread use of WordPress across Europe, including by media companies, educational institutions, and government agencies, the vulnerability poses a broad risk. Attackers could leverage this flaw to establish persistent backdoors, pivot within internal networks, or launch further attacks targeting European digital infrastructure.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the PublishPress Authors plugin and confirm the version in use. Until an official patch is released, it is recommended to disable or uninstall the plugin to eliminate the attack surface. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as those containing directory traversal sequences or remote URLs in parameters related to file inclusion. Additionally, strict input validation and sanitization should be enforced on any user-controllable input that could influence file paths. Monitoring web server logs for unusual include/require requests and implementing least privilege principles for web server processes can limit potential damage. Organizations should subscribe to vendor and security advisories to apply patches promptly once available. Finally, conducting penetration testing focused on file inclusion vulnerabilities can help identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:39:15.825Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd9534

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 12:27:34 PM

Last updated: 8/9/2025, 8:02:06 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats