Skip to main content

CVE-2025-48136: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Estatik Mortgage Calculator Estatik

High
VulnerabilityCVE-2025-48136cvecve-2025-48136cwe-98
Published: Fri May 16 2025 (05/16/2025, 15:45:14 UTC)
Source: CVE
Vendor/Project: Estatik
Product: Mortgage Calculator Estatik

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Estatik Mortgage Calculator Estatik allows PHP Local File Inclusion. This issue affects Mortgage Calculator Estatik: from n/a through 2.0.12.

AI-Powered Analysis

AILast updated: 07/11/2025, 23:03:35 UTC

Technical Analysis

CVE-2025-48136 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Estatik Mortgage Calculator plugin, versions up to and including 2.0.12. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that is used in include or require statements without proper validation or sanitization. This can lead to the inclusion and execution of arbitrary local files on the server, potentially resulting in remote code execution, data disclosure, or complete system compromise. The CVSS 3.1 base score of 7.5 reflects a high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote exploitation and the critical impact on affected systems. The absence of available patches at the time of reporting increases the urgency for mitigation and monitoring. The vulnerability arises from insufficient validation of input controlling file inclusion, a common and dangerous PHP security flaw that can be exploited to execute arbitrary code or disclose sensitive files on the server hosting the Estatik Mortgage Calculator plugin.

Potential Impact

For European organizations using the Estatik Mortgage Calculator plugin, this vulnerability could lead to severe consequences including unauthorized access to sensitive financial data, compromise of web servers, and potential lateral movement within internal networks. Given that mortgage calculators often handle personal and financial information, exploitation could result in data breaches affecting confidentiality and privacy compliance obligations under GDPR. The high integrity and availability impacts mean attackers could alter or disrupt mortgage calculation services, damaging business operations and customer trust. Since the attack vector is network-based and requires only low privileges without user interaction, remote attackers could exploit this vulnerability at scale if the plugin is publicly accessible. This risk is particularly acute for real estate agencies, financial institutions, and property management companies in Europe that rely on Estatik Mortgage Calculator for their online services. The lack of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization remains high.

Mitigation Recommendations

European organizations should immediately audit their web environments to identify installations of the Estatik Mortgage Calculator plugin, especially versions up to 2.0.12. Until an official patch is released, organizations should implement strict input validation and sanitization on any parameters controlling file inclusion, employing whitelisting of allowed filenames or disabling dynamic includes where possible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion patterns. Restricting PHP file permissions and disabling unnecessary PHP functions such as 'include' and 'require' for untrusted inputs can reduce risk. Additionally, organizations should monitor web server logs for anomalous access patterns indicative of LFI attempts. Segmentation of web servers and limiting privileges of web application processes can contain potential breaches. Finally, maintain close communication with the vendor for timely patch releases and apply updates as soon as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:40.431Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebd7b

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 11:03:35 PM

Last updated: 8/14/2025, 10:58:09 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats