CVE-2025-48157: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Michele Giorgi Formality
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.9.
AI Analysis
Technical Summary
CVE-2025-48157 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the PHP-based software 'Formality' developed by Michele Giorgi, up to version 1.5.9. The flaw allows an attacker to perform a Local File Inclusion (LFI) attack, which can lead to the inclusion and execution of arbitrary files on the server. This occurs because the application does not properly validate or sanitize user-supplied input that determines which files are included or required during runtime. Exploiting this vulnerability could allow an attacker to read sensitive files, execute arbitrary PHP code, or escalate privileges on the affected system. The CVSS v3.1 score of 8.1 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a critical concern for organizations using Formality. The absence of patches at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations using Formality, this vulnerability poses significant risks. Successful exploitation can lead to unauthorized disclosure of sensitive data, including configuration files, credentials, or business-critical information, compromising confidentiality. Integrity can be undermined by injecting malicious code or altering application behavior, potentially leading to data corruption or further system compromise. Availability may also be affected if attackers execute denial-of-service conditions or disrupt normal operations. Given the network-based attack vector and no requirement for authentication or user interaction, attackers can remotely exploit this vulnerability, increasing the risk of widespread impact. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often handle sensitive personal and operational data, are particularly vulnerable. Additionally, the potential for lateral movement within networks after initial compromise can exacerbate the damage. The lack of known exploits currently provides a window for proactive defense, but the high severity score indicates that exploitation could have severe consequences.
Mitigation Recommendations
Immediate mitigation steps include: 1) Conducting an inventory to identify all instances of Formality in use within the organization. 2) Applying any available vendor patches or updates as soon as they are released; since no patches are currently available, organizations should monitor vendor communications closely. 3) Implementing web application firewalls (WAFs) with rules designed to detect and block suspicious include/require parameter manipulations or attempts to access local files. 4) Employing strict input validation and sanitization on all user-supplied inputs, particularly those influencing file inclusion logic, to prevent malicious payloads. 5) Restricting PHP functions such as include(), require(), and file operations through configuration settings (e.g., disabling allow_url_include and using open_basedir restrictions) to limit file system access. 6) Enhancing logging and monitoring to detect anomalous file access patterns or error messages indicative of exploitation attempts. 7) Conducting security awareness training for developers and administrators on secure coding practices related to file inclusion. 8) Considering network segmentation and least privilege principles to limit the impact of a potential compromise. These measures, combined, reduce the attack surface and improve detection and response capabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-48157: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Michele Giorgi Formality
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-48157 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the PHP-based software 'Formality' developed by Michele Giorgi, up to version 1.5.9. The flaw allows an attacker to perform a Local File Inclusion (LFI) attack, which can lead to the inclusion and execution of arbitrary files on the server. This occurs because the application does not properly validate or sanitize user-supplied input that determines which files are included or required during runtime. Exploiting this vulnerability could allow an attacker to read sensitive files, execute arbitrary PHP code, or escalate privileges on the affected system. The CVSS v3.1 score of 8.1 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a critical concern for organizations using Formality. The absence of patches at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations using Formality, this vulnerability poses significant risks. Successful exploitation can lead to unauthorized disclosure of sensitive data, including configuration files, credentials, or business-critical information, compromising confidentiality. Integrity can be undermined by injecting malicious code or altering application behavior, potentially leading to data corruption or further system compromise. Availability may also be affected if attackers execute denial-of-service conditions or disrupt normal operations. Given the network-based attack vector and no requirement for authentication or user interaction, attackers can remotely exploit this vulnerability, increasing the risk of widespread impact. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often handle sensitive personal and operational data, are particularly vulnerable. Additionally, the potential for lateral movement within networks after initial compromise can exacerbate the damage. The lack of known exploits currently provides a window for proactive defense, but the high severity score indicates that exploitation could have severe consequences.
Mitigation Recommendations
Immediate mitigation steps include: 1) Conducting an inventory to identify all instances of Formality in use within the organization. 2) Applying any available vendor patches or updates as soon as they are released; since no patches are currently available, organizations should monitor vendor communications closely. 3) Implementing web application firewalls (WAFs) with rules designed to detect and block suspicious include/require parameter manipulations or attempts to access local files. 4) Employing strict input validation and sanitization on all user-supplied inputs, particularly those influencing file inclusion logic, to prevent malicious payloads. 5) Restricting PHP functions such as include(), require(), and file operations through configuration settings (e.g., disabling allow_url_include and using open_basedir restrictions) to limit file system access. 6) Enhancing logging and monitoring to detect anomalous file access patterns or error messages indicative of exploitation attempts. 7) Conducting security awareness training for developers and administrators on secure coding practices related to file inclusion. 8) Considering network segmentation and least privilege principles to limit the impact of a potential compromise. These measures, combined, reduce the attack surface and improve detection and response capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T18:02:03.511Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a584b3ad5a09ad0002e2aa
Added to database: 8/20/2025, 8:17:55 AM
Last enriched: 8/20/2025, 9:49:04 AM
Last updated: 8/27/2025, 12:34:26 AM
Views: 1
Related Threats
CVE-2025-58361: CWE-20: Improper Input Validation in MarceloTessaro promptcraft-forge-studio
CriticalCVE-2025-58353: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MarceloTessaro promptcraft-forge-studio
HighCVE-2025-32322: Elevation of privilege in Google Android
HighCVE-2025-22415: Elevation of privilege in Google Android
HighCVE-2025-22414: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.