CVE-2025-48136: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Estatik Mortgage Calculator Estatik
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Estatik Mortgage Calculator Estatik allows PHP Local File Inclusion. This issue affects Mortgage Calculator Estatik: from n/a through 2.0.12.
AI Analysis
Technical Summary
CVE-2025-48136 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Estatik Mortgage Calculator plugin, versions up to and including 2.0.12. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that is used in include or require statements without proper validation or sanitization. This can lead to the inclusion and execution of arbitrary local files on the server, potentially resulting in remote code execution, data disclosure, or complete system compromise. The CVSS 3.1 base score of 7.5 reflects a high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote exploitation and the critical impact on affected systems. The absence of available patches at the time of reporting increases the urgency for mitigation and monitoring. The vulnerability arises from insufficient validation of input controlling file inclusion, a common and dangerous PHP security flaw that can be exploited to execute arbitrary code or disclose sensitive files on the server hosting the Estatik Mortgage Calculator plugin.
Potential Impact
For European organizations using the Estatik Mortgage Calculator plugin, this vulnerability could lead to severe consequences including unauthorized access to sensitive financial data, compromise of web servers, and potential lateral movement within internal networks. Given that mortgage calculators often handle personal and financial information, exploitation could result in data breaches affecting confidentiality and privacy compliance obligations under GDPR. The high integrity and availability impacts mean attackers could alter or disrupt mortgage calculation services, damaging business operations and customer trust. Since the attack vector is network-based and requires only low privileges without user interaction, remote attackers could exploit this vulnerability at scale if the plugin is publicly accessible. This risk is particularly acute for real estate agencies, financial institutions, and property management companies in Europe that rely on Estatik Mortgage Calculator for their online services. The lack of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization remains high.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the Estatik Mortgage Calculator plugin, especially versions up to 2.0.12. Until an official patch is released, organizations should implement strict input validation and sanitization on any parameters controlling file inclusion, employing whitelisting of allowed filenames or disabling dynamic includes where possible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion patterns. Restricting PHP file permissions and disabling unnecessary PHP functions such as 'include' and 'require' for untrusted inputs can reduce risk. Additionally, organizations should monitor web server logs for anomalous access patterns indicative of LFI attempts. Segmentation of web servers and limiting privileges of web application processes can contain potential breaches. Finally, maintain close communication with the vendor for timely patch releases and apply updates as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-48136: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Estatik Mortgage Calculator Estatik
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Estatik Mortgage Calculator Estatik allows PHP Local File Inclusion. This issue affects Mortgage Calculator Estatik: from n/a through 2.0.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-48136 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Estatik Mortgage Calculator plugin, versions up to and including 2.0.12. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter that is used in include or require statements without proper validation or sanitization. This can lead to the inclusion and execution of arbitrary local files on the server, potentially resulting in remote code execution, data disclosure, or complete system compromise. The CVSS 3.1 base score of 7.5 reflects a high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote exploitation and the critical impact on affected systems. The absence of available patches at the time of reporting increases the urgency for mitigation and monitoring. The vulnerability arises from insufficient validation of input controlling file inclusion, a common and dangerous PHP security flaw that can be exploited to execute arbitrary code or disclose sensitive files on the server hosting the Estatik Mortgage Calculator plugin.
Potential Impact
For European organizations using the Estatik Mortgage Calculator plugin, this vulnerability could lead to severe consequences including unauthorized access to sensitive financial data, compromise of web servers, and potential lateral movement within internal networks. Given that mortgage calculators often handle personal and financial information, exploitation could result in data breaches affecting confidentiality and privacy compliance obligations under GDPR. The high integrity and availability impacts mean attackers could alter or disrupt mortgage calculation services, damaging business operations and customer trust. Since the attack vector is network-based and requires only low privileges without user interaction, remote attackers could exploit this vulnerability at scale if the plugin is publicly accessible. This risk is particularly acute for real estate agencies, financial institutions, and property management companies in Europe that rely on Estatik Mortgage Calculator for their online services. The lack of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization remains high.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the Estatik Mortgage Calculator plugin, especially versions up to 2.0.12. Until an official patch is released, organizations should implement strict input validation and sanitization on any parameters controlling file inclusion, employing whitelisting of allowed filenames or disabling dynamic includes where possible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion patterns. Restricting PHP file permissions and disabling unnecessary PHP functions such as 'include' and 'require' for untrusted inputs can reduce risk. Additionally, organizations should monitor web server logs for anomalous access patterns indicative of LFI attempts. Segmentation of web servers and limiting privileges of web application processes can contain potential breaches. Finally, maintain close communication with the vendor for timely patch releases and apply updates as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T18:01:40.431Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebd7b
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:03:35 PM
Last updated: 8/14/2025, 10:58:09 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.