Skip to main content

CVE-2025-47693: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in roninwp FAT Services Booking

High
VulnerabilityCVE-2025-47693cvecve-2025-47693cwe-98
Published: Fri May 16 2025 (05/16/2025, 15:45:17 UTC)
Source: CVE
Vendor/Project: roninwp
Product: FAT Services Booking

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in roninwp FAT Services Booking allows PHP Local File Inclusion. This issue affects FAT Services Booking: from n/a through 5.5.

AI-Powered Analysis

AILast updated: 07/11/2025, 22:48:56 UTC

Technical Analysis

CVE-2025-47693 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the roninwp FAT Services Booking plugin, versions up to and including 5.5. The flaw allows for PHP Local File Inclusion (LFI), a type of vulnerability where an attacker can trick the application into including files from the local server filesystem. This can lead to arbitrary code execution, information disclosure, and potentially full system compromise depending on the server configuration and the files accessible. The vulnerability arises because the plugin does not properly validate or sanitize user-supplied input that determines which files are included via PHP's include or require statements. The CVSS v3.1 score is 7.5, indicating a high severity with the vector string AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network but requires high attack complexity and low privileges, with no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation can lead to disclosure of sensitive files, modification of application behavior, and denial of service or code execution. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability was published on May 16, 2025, and is tracked by Patchstack and CISA enrichment, indicating recognition by authoritative security bodies.

Potential Impact

For European organizations using the roninwp FAT Services Booking plugin, this vulnerability poses a significant risk. The ability to perform local file inclusion can allow attackers to access sensitive configuration files, credentials, or other protected data, potentially leading to data breaches. Furthermore, it can enable remote code execution, allowing attackers to take control of affected web servers, disrupt services, or pivot within internal networks. This is particularly critical for organizations in sectors such as hospitality, event management, or service booking platforms that rely on this plugin for customer-facing booking functionalities. Compromise could lead to loss of customer trust, regulatory penalties under GDPR for data breaches, and operational downtime. Given the high confidentiality, integrity, and availability impact, exploitation could severely disrupt business operations and expose sensitive personal data of European citizens.

Mitigation Recommendations

European organizations should immediately audit their use of the roninwp FAT Services Booking plugin and identify affected versions (up to 5.5). Until an official patch is released, it is recommended to implement strict input validation and sanitization on any parameters controlling file inclusion paths. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit LFI patterns. Restricting PHP include paths and disabling allow_url_include in PHP configurations can reduce risk. Additionally, running the web server with least privilege and isolating the application environment can limit the impact of potential exploitation. Monitoring logs for unusual file access or errors related to include statements can provide early detection. Organizations should subscribe to vendor advisories for prompt patch releases and apply updates as soon as they become available. If feasible, consider temporarily disabling the plugin or replacing it with alternative booking solutions until the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T10:45:47.046Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebd5c

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 10:48:56 PM

Last updated: 7/29/2025, 12:50:35 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats