Skip to main content

CVE-2025-47572: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in mojoomla School Management

High
VulnerabilityCVE-2025-47572cvecve-2025-47572cwe-98
Published: Tue Jun 17 2025 (06/17/2025, 15:01:33 UTC)
Source: CVE Database V5
Vendor/Project: mojoomla
Product: School Management

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla School Management allows PHP Local File Inclusion. This issue affects School Management: from n/a through 93.0.0.

AI-Powered Analysis

AILast updated: 06/17/2025, 16:06:19 UTC

Technical Analysis

CVE-2025-47572 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the mojoomla School Management software, a PHP-based application designed for managing school administrative tasks. The flaw allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter to include unintended files on the server. This can lead to arbitrary code execution, disclosure of sensitive information, or full system compromise depending on the files included and the server configuration. The vulnerability is exploitable remotely over the network (AV:N) but requires high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to complete system takeover, data leakage, and service disruption. No patches or known exploits in the wild have been reported yet. The affected versions are not explicitly listed but include all versions up to 93.0.0. The vulnerability arises from insufficient validation or sanitization of input controlling the filename in include/require statements, allowing attackers to traverse directories or inject malicious file paths. This type of vulnerability is critical in web applications, especially those handling sensitive data such as school records, personal information, and administrative credentials.

Potential Impact

For European organizations, particularly educational institutions using mojoomla School Management software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to student records, staff information, and internal communications, violating data protection regulations such as GDPR. The high impact on confidentiality, integrity, and availability means attackers could alter records, disrupt school operations, or use the compromised system as a foothold for further attacks within the network. Given the critical nature of educational services and the sensitivity of personal data involved, the operational and reputational damage could be substantial. Additionally, since the vulnerability requires only low privileges but no user interaction, it could be exploited by attackers who have gained limited access or by automated scanning tools, increasing the likelihood of compromise. The lack of known exploits currently suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediate code review and sanitization: Developers and administrators should audit all include and require statements in the mojoomla School Management codebase to ensure that filenames are strictly validated against a whitelist of allowed files or directories. 2. Apply virtual patching: If official patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns targeting the vulnerable parameters. 3. Restrict file permissions: Harden the server by limiting PHP process permissions to only necessary directories, preventing inclusion of sensitive system files. 4. Disable remote file inclusion: Ensure PHP configuration directives such as allow_url_include are disabled to prevent remote file inclusion attacks. 5. Monitor logs: Set up enhanced logging and alerting for unusual file inclusion attempts or errors related to include/require statements. 6. Update promptly: Once the vendor releases a patch, apply it immediately. 7. Network segmentation: Isolate the school management system from critical internal networks to limit lateral movement if compromised. 8. Conduct penetration testing: Regularly test the application for similar vulnerabilities and verify the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:55:20.908Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68518788a8c921274385def5

Added to database: 6/17/2025, 3:19:36 PM

Last enriched: 6/17/2025, 4:06:19 PM

Last updated: 8/4/2025, 12:20:44 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats