CVE-2025-47496: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PublishPress PublishPress Authors
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PublishPress PublishPress Authors allows PHP Local File Inclusion. This issue affects PublishPress Authors: from n/a through 4.7.5.
AI Analysis
Technical Summary
CVE-2025-47496 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the PublishPress Authors plugin, versions up to and including 4.7.5. The flaw allows for PHP Remote File Inclusion (RFI), enabling an attacker to manipulate the filename parameter used in PHP include or require functions to load arbitrary files. This can lead to Local File Inclusion (LFI) or potentially Remote File Inclusion, depending on server configuration and input sanitization. Exploiting this vulnerability can allow an attacker to execute arbitrary PHP code on the affected server, leading to full compromise of the web application environment. The CVSS v3.1 base score is 7.5, indicating a high severity with network attack vector, high complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for organizations using the PublishPress Authors plugin in their WordPress environments. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the PublishPress Authors plugin for content management and author attribution. Successful exploitation could lead to unauthorized code execution, data breaches involving sensitive user or business information, website defacement, or complete service disruption. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and incur financial losses from remediation and downtime. Given the widespread use of WordPress across Europe, including by media companies, educational institutions, and government agencies, the vulnerability poses a broad risk. Attackers could leverage this flaw to establish persistent backdoors, pivot within internal networks, or launch further attacks targeting European digital infrastructure.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the PublishPress Authors plugin and confirm the version in use. Until an official patch is released, it is recommended to disable or uninstall the plugin to eliminate the attack surface. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as those containing directory traversal sequences or remote URLs in parameters related to file inclusion. Additionally, strict input validation and sanitization should be enforced on any user-controllable input that could influence file paths. Monitoring web server logs for unusual include/require requests and implementing least privilege principles for web server processes can limit potential damage. Organizations should subscribe to vendor and security advisories to apply patches promptly once available. Finally, conducting penetration testing focused on file inclusion vulnerabilities can help identify residual risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47496: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PublishPress PublishPress Authors
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PublishPress PublishPress Authors allows PHP Local File Inclusion. This issue affects PublishPress Authors: from n/a through 4.7.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-47496 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the PublishPress Authors plugin, versions up to and including 4.7.5. The flaw allows for PHP Remote File Inclusion (RFI), enabling an attacker to manipulate the filename parameter used in PHP include or require functions to load arbitrary files. This can lead to Local File Inclusion (LFI) or potentially Remote File Inclusion, depending on server configuration and input sanitization. Exploiting this vulnerability can allow an attacker to execute arbitrary PHP code on the affected server, leading to full compromise of the web application environment. The CVSS v3.1 base score is 7.5, indicating a high severity with network attack vector, high complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for organizations using the PublishPress Authors plugin in their WordPress environments. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the PublishPress Authors plugin for content management and author attribution. Successful exploitation could lead to unauthorized code execution, data breaches involving sensitive user or business information, website defacement, or complete service disruption. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and incur financial losses from remediation and downtime. Given the widespread use of WordPress across Europe, including by media companies, educational institutions, and government agencies, the vulnerability poses a broad risk. Attackers could leverage this flaw to establish persistent backdoors, pivot within internal networks, or launch further attacks targeting European digital infrastructure.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the PublishPress Authors plugin and confirm the version in use. Until an official patch is released, it is recommended to disable or uninstall the plugin to eliminate the attack surface. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as those containing directory traversal sequences or remote URLs in parameters related to file inclusion. Additionally, strict input validation and sanitization should be enforced on any user-controllable input that could influence file paths. Monitoring web server logs for unusual include/require requests and implementing least privilege principles for web server processes can limit potential damage. Organizations should subscribe to vendor and security advisories to apply patches promptly once available. Finally, conducting penetration testing focused on file inclusion vulnerabilities can help identify residual risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:39:15.825Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd9534
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 12:27:34 PM
Last updated: 8/9/2025, 8:02:06 AM
Views: 18
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.