CVE-2025-48136: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Estatik Mortgage Calculator Estatik
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Estatik Mortgage Calculator Estatik allows PHP Local File Inclusion. This issue affects Mortgage Calculator Estatik: from n/a through 2.0.12.
AI Analysis
Technical Summary
CVE-2025-48136 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Estatik Mortgage Calculator plugin, versions up to and including 2.0.12. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that is used in include or require statements without proper validation or sanitization. This can lead to the inclusion and execution of arbitrary local files on the server, potentially resulting in remote code execution, data disclosure, or complete system compromise. The CVSS 3.1 base score of 7.5 reflects a high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote exploitation and the critical impact on affected systems. The absence of available patches at the time of reporting increases the urgency for mitigation and monitoring. The vulnerability arises from insufficient validation of input controlling file inclusion, a common and dangerous PHP security flaw that can be exploited to execute arbitrary code or disclose sensitive files on the server hosting the Estatik Mortgage Calculator plugin.
Potential Impact
For European organizations using the Estatik Mortgage Calculator plugin, this vulnerability could lead to severe consequences including unauthorized access to sensitive financial data, compromise of web servers, and potential lateral movement within internal networks. Given that mortgage calculators often handle personal and financial information, exploitation could result in data breaches affecting confidentiality and privacy compliance obligations under GDPR. The high integrity and availability impacts mean attackers could alter or disrupt mortgage calculation services, damaging business operations and customer trust. Since the attack vector is network-based and requires only low privileges without user interaction, remote attackers could exploit this vulnerability at scale if the plugin is publicly accessible. This risk is particularly acute for real estate agencies, financial institutions, and property management companies in Europe that rely on Estatik Mortgage Calculator for their online services. The lack of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization remains high.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the Estatik Mortgage Calculator plugin, especially versions up to 2.0.12. Until an official patch is released, organizations should implement strict input validation and sanitization on any parameters controlling file inclusion, employing whitelisting of allowed filenames or disabling dynamic includes where possible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion patterns. Restricting PHP file permissions and disabling unnecessary PHP functions such as 'include' and 'require' for untrusted inputs can reduce risk. Additionally, organizations should monitor web server logs for anomalous access patterns indicative of LFI attempts. Segmentation of web servers and limiting privileges of web application processes can contain potential breaches. Finally, maintain close communication with the vendor for timely patch releases and apply updates as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-48136: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Estatik Mortgage Calculator Estatik
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Estatik Mortgage Calculator Estatik allows PHP Local File Inclusion. This issue affects Mortgage Calculator Estatik: from n/a through 2.0.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-48136 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Estatik Mortgage Calculator plugin, versions up to and including 2.0.12. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that is used in include or require statements without proper validation or sanitization. This can lead to the inclusion and execution of arbitrary local files on the server, potentially resulting in remote code execution, data disclosure, or complete system compromise. The CVSS 3.1 base score of 7.5 reflects a high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote exploitation and the critical impact on affected systems. The absence of available patches at the time of reporting increases the urgency for mitigation and monitoring. The vulnerability arises from insufficient validation of input controlling file inclusion, a common and dangerous PHP security flaw that can be exploited to execute arbitrary code or disclose sensitive files on the server hosting the Estatik Mortgage Calculator plugin.
Potential Impact
For European organizations using the Estatik Mortgage Calculator plugin, this vulnerability could lead to severe consequences including unauthorized access to sensitive financial data, compromise of web servers, and potential lateral movement within internal networks. Given that mortgage calculators often handle personal and financial information, exploitation could result in data breaches affecting confidentiality and privacy compliance obligations under GDPR. The high integrity and availability impacts mean attackers could alter or disrupt mortgage calculation services, damaging business operations and customer trust. Since the attack vector is network-based and requires only low privileges without user interaction, remote attackers could exploit this vulnerability at scale if the plugin is publicly accessible. This risk is particularly acute for real estate agencies, financial institutions, and property management companies in Europe that rely on Estatik Mortgage Calculator for their online services. The lack of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization remains high.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the Estatik Mortgage Calculator plugin, especially versions up to 2.0.12. Until an official patch is released, organizations should implement strict input validation and sanitization on any parameters controlling file inclusion, employing whitelisting of allowed filenames or disabling dynamic includes where possible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion patterns. Restricting PHP file permissions and disabling unnecessary PHP functions such as 'include' and 'require' for untrusted inputs can reduce risk. Additionally, organizations should monitor web server logs for anomalous access patterns indicative of LFI attempts. Segmentation of web servers and limiting privileges of web application processes can contain potential breaches. Finally, maintain close communication with the vendor for timely patch releases and apply updates as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T18:01:40.431Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebd7b
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:03:35 PM
Last updated: 11/22/2025, 4:41:59 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.