Skip to main content

CVE-2025-47508: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Ruben Garcia GamiPress

High
VulnerabilityCVE-2025-47508cvecve-2025-47508cwe-98
Published: Wed May 07 2025 (05/07/2025, 14:20:00 UTC)
Source: CVE
Vendor/Project: Ruben Garcia
Product: GamiPress

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ruben Garcia GamiPress allows PHP Local File Inclusion. This issue affects GamiPress: from n/a through 7.3.7.

AI-Powered Analysis

AILast updated: 07/05/2025, 06:25:30 UTC

Technical Analysis

CVE-2025-47508 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the GamiPress plugin developed by Ruben Garcia, versions up to and including 7.3.7. The flaw allows for PHP Local File Inclusion (LFI), which occurs when an attacker can manipulate the filename parameter in an include or require statement to load unintended files from the local filesystem. Although the description mentions PHP Remote File Inclusion (RFI), the actual issue is LFI, which can still lead to significant security risks such as arbitrary code execution, information disclosure, and system compromise. The vulnerability has a CVSS v3.1 base score of 7.5, indicating a high severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network (AV:N), but requires high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability arises due to insufficient validation or sanitization of input controlling the filename in include/require statements, allowing attackers to traverse directories or specify malicious file paths. This can lead to execution of arbitrary PHP code, disclosure of sensitive files, or denial of service. Given that GamiPress is a WordPress plugin used to gamify websites, the vulnerability primarily affects websites running this plugin, potentially exposing them to compromise.

Potential Impact

For European organizations using GamiPress on their WordPress sites, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code on web servers, leading to full system compromise, data theft, defacement, or pivoting to internal networks. Confidentiality of sensitive customer or business data could be breached, integrity of website content and backend systems compromised, and availability disrupted through denial-of-service conditions. Organizations in sectors such as e-commerce, education, media, and government that rely on WordPress with GamiPress for user engagement are particularly at risk. The high impact on confidentiality, integrity, and availability means that exploitation could result in regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. The requirement for low privileges but high attack complexity suggests that while exploitation is not trivial, motivated attackers with some access or knowledge could leverage this flaw. The lack of user interaction needed increases the risk of automated or remote attacks. Since no known exploits are currently in the wild, proactive mitigation is critical to prevent future incidents.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence and version of the GamiPress plugin. Until an official patch is released, apply the following mitigations: 1) Restrict access to the affected plugin files and directories using web server configuration (e.g., .htaccess rules) to prevent unauthorized HTTP requests targeting include parameters. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns. 3) Disable or limit the use of dynamic include/require statements in custom code or plugin configurations if possible. 4) Monitor web server logs for anomalous requests indicative of LFI attempts. 5) Run WordPress and all plugins with the least privileges necessary and isolate the web server environment to limit potential damage. 6) Regularly back up website data and configurations to enable rapid recovery. 7) Stay alert for official patches or updates from the GamiPress developer and apply them promptly once available. 8) Educate development and security teams about the risks of improper input validation in PHP applications to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:39:30.829Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd84d2

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:25:30 AM

Last updated: 7/31/2025, 10:07:14 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats