CVE-2025-47572: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in mojoomla School Management
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla School Management allows PHP Local File Inclusion. This issue affects School Management: from n/a through 93.0.0.
AI Analysis
Technical Summary
CVE-2025-47572 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the mojoomla School Management software, a PHP-based application designed for managing school administrative tasks. The flaw allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter to include unintended files on the server. This can lead to arbitrary code execution, disclosure of sensitive information, or full system compromise depending on the files included and the server configuration. The vulnerability is exploitable remotely over the network (AV:N) but requires high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to complete system takeover, data leakage, and service disruption. No patches or known exploits in the wild have been reported yet. The affected versions are not explicitly listed but include all versions up to 93.0.0. The vulnerability arises from insufficient validation or sanitization of input controlling the filename in include/require statements, allowing attackers to traverse directories or inject malicious file paths. This type of vulnerability is critical in web applications, especially those handling sensitive data such as school records, personal information, and administrative credentials.
Potential Impact
For European organizations, particularly educational institutions using mojoomla School Management software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to student records, staff information, and internal communications, violating data protection regulations such as GDPR. The high impact on confidentiality, integrity, and availability means attackers could alter records, disrupt school operations, or use the compromised system as a foothold for further attacks within the network. Given the critical nature of educational services and the sensitivity of personal data involved, the operational and reputational damage could be substantial. Additionally, since the vulnerability requires only low privileges but no user interaction, it could be exploited by attackers who have gained limited access or by automated scanning tools, increasing the likelihood of compromise. The lack of known exploits currently suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediate code review and sanitization: Developers and administrators should audit all include and require statements in the mojoomla School Management codebase to ensure that filenames are strictly validated against a whitelist of allowed files or directories. 2. Apply virtual patching: If official patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns targeting the vulnerable parameters. 3. Restrict file permissions: Harden the server by limiting PHP process permissions to only necessary directories, preventing inclusion of sensitive system files. 4. Disable remote file inclusion: Ensure PHP configuration directives such as allow_url_include are disabled to prevent remote file inclusion attacks. 5. Monitor logs: Set up enhanced logging and alerting for unusual file inclusion attempts or errors related to include/require statements. 6. Update promptly: Once the vendor releases a patch, apply it immediately. 7. Network segmentation: Isolate the school management system from critical internal networks to limit lateral movement if compromised. 8. Conduct penetration testing: Regularly test the application for similar vulnerabilities and verify the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-47572: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in mojoomla School Management
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla School Management allows PHP Local File Inclusion. This issue affects School Management: from n/a through 93.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-47572 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the mojoomla School Management software, a PHP-based application designed for managing school administrative tasks. The flaw allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter to include unintended files on the server. This can lead to arbitrary code execution, disclosure of sensitive information, or full system compromise depending on the files included and the server configuration. The vulnerability is exploitable remotely over the network (AV:N) but requires high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to complete system takeover, data leakage, and service disruption. No patches or known exploits in the wild have been reported yet. The affected versions are not explicitly listed but include all versions up to 93.0.0. The vulnerability arises from insufficient validation or sanitization of input controlling the filename in include/require statements, allowing attackers to traverse directories or inject malicious file paths. This type of vulnerability is critical in web applications, especially those handling sensitive data such as school records, personal information, and administrative credentials.
Potential Impact
For European organizations, particularly educational institutions using mojoomla School Management software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to student records, staff information, and internal communications, violating data protection regulations such as GDPR. The high impact on confidentiality, integrity, and availability means attackers could alter records, disrupt school operations, or use the compromised system as a foothold for further attacks within the network. Given the critical nature of educational services and the sensitivity of personal data involved, the operational and reputational damage could be substantial. Additionally, since the vulnerability requires only low privileges but no user interaction, it could be exploited by attackers who have gained limited access or by automated scanning tools, increasing the likelihood of compromise. The lack of known exploits currently suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediate code review and sanitization: Developers and administrators should audit all include and require statements in the mojoomla School Management codebase to ensure that filenames are strictly validated against a whitelist of allowed files or directories. 2. Apply virtual patching: If official patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns targeting the vulnerable parameters. 3. Restrict file permissions: Harden the server by limiting PHP process permissions to only necessary directories, preventing inclusion of sensitive system files. 4. Disable remote file inclusion: Ensure PHP configuration directives such as allow_url_include are disabled to prevent remote file inclusion attacks. 5. Monitor logs: Set up enhanced logging and alerting for unusual file inclusion attempts or errors related to include/require statements. 6. Update promptly: Once the vendor releases a patch, apply it immediately. 7. Network segmentation: Isolate the school management system from critical internal networks to limit lateral movement if compromised. 8. Conduct penetration testing: Regularly test the application for similar vulnerabilities and verify the effectiveness of mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:55:20.908Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68518788a8c921274385def5
Added to database: 6/17/2025, 3:19:36 PM
Last enriched: 6/17/2025, 4:06:19 PM
Last updated: 8/4/2025, 12:20:44 AM
Views: 13
Related Threats
CVE-2025-4410: CWE-20 Improper Input Validation in Insyde Software InsydeH2O
HighCVE-2025-4277: CWE-20 Improper Input Validation in Insyde Software InsydeH2O
HighCVE-2025-4276: CWE-20 Improper Input Validation in Insyde Software InsydeH2O
HighCVE-2025-54223: Use After Free (CWE-416) in Adobe InCopy
HighCVE-2025-54221: Out-of-bounds Write (CWE-787) in Adobe InCopy
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.