CVE-2025-48302: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Roxnor FundEngine
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roxnor FundEngine allows PHP Local File Inclusion. This issue affects FundEngine: from n/a through 1.7.4.
AI Analysis
Technical Summary
CVE-2025-48302 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects Roxnor's FundEngine product up to version 1.7.4. The flaw allows for PHP Local File Inclusion (LFI), which can enable an attacker to include and execute arbitrary files on the server. This occurs because the application does not properly validate or sanitize user-supplied input used in file inclusion functions, allowing an attacker to manipulate the filename parameter. Although the CVSS vector indicates a network attack vector (AV:N), it requires low privileges (PR:L) but no user interaction (UI:N). The attack complexity is high (AC:H), meaning exploitation requires some conditions or knowledge, but successful exploitation can lead to full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not currently have known exploits in the wild, and no patches have been linked yet. The improper control of file inclusion can lead to remote code execution if combined with other vulnerabilities or misconfigurations, or at minimum, disclosure of sensitive files and potential privilege escalation. Given that FundEngine is a financial software product, exploitation could have severe consequences for organizations relying on it for fund management or financial operations.
Potential Impact
For European organizations using Roxnor FundEngine, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive financial data, manipulation of financial records, or disruption of fund management operations. The high impact on confidentiality, integrity, and availability means attackers could steal confidential client information, alter transaction data, or cause service outages. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations), reputational damage, and legal consequences. Financial institutions and asset managers in Europe are particularly sensitive to such risks due to stringent data protection regulations and the critical nature of their services. Additionally, the high attack complexity may limit widespread exploitation, but targeted attacks against high-value organizations remain a concern. The lack of known exploits currently provides a window for mitigation before active exploitation occurs.
Mitigation Recommendations
Organizations should immediately audit their use of Roxnor FundEngine and identify affected versions (up to 1.7.4). Until an official patch is released, implement strict input validation and sanitization on all parameters used in include or require statements to prevent malicious file path manipulation. Employ web application firewalls (WAFs) with rules targeting LFI attack patterns to detect and block suspicious requests. Restrict file system permissions for the web server user to limit access to sensitive files and directories, minimizing the impact of potential LFI exploitation. Monitor logs for unusual file inclusion attempts or errors related to file handling. Consider isolating the FundEngine application in a segmented network zone to reduce lateral movement risk. Engage with Roxnor for timely patch updates and apply them as soon as they become available. Conduct security awareness training for developers and administrators on secure coding practices related to file inclusion. Finally, perform regular vulnerability scanning and penetration testing focused on file inclusion vulnerabilities to proactively identify and remediate issues.
Affected Countries
United Kingdom, Germany, France, Netherlands, Switzerland, Luxembourg
CVE-2025-48302: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Roxnor FundEngine
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roxnor FundEngine allows PHP Local File Inclusion. This issue affects FundEngine: from n/a through 1.7.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-48302 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects Roxnor's FundEngine product up to version 1.7.4. The flaw allows for PHP Local File Inclusion (LFI), which can enable an attacker to include and execute arbitrary files on the server. This occurs because the application does not properly validate or sanitize user-supplied input used in file inclusion functions, allowing an attacker to manipulate the filename parameter. Although the CVSS vector indicates a network attack vector (AV:N), it requires low privileges (PR:L) but no user interaction (UI:N). The attack complexity is high (AC:H), meaning exploitation requires some conditions or knowledge, but successful exploitation can lead to full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not currently have known exploits in the wild, and no patches have been linked yet. The improper control of file inclusion can lead to remote code execution if combined with other vulnerabilities or misconfigurations, or at minimum, disclosure of sensitive files and potential privilege escalation. Given that FundEngine is a financial software product, exploitation could have severe consequences for organizations relying on it for fund management or financial operations.
Potential Impact
For European organizations using Roxnor FundEngine, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive financial data, manipulation of financial records, or disruption of fund management operations. The high impact on confidentiality, integrity, and availability means attackers could steal confidential client information, alter transaction data, or cause service outages. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations), reputational damage, and legal consequences. Financial institutions and asset managers in Europe are particularly sensitive to such risks due to stringent data protection regulations and the critical nature of their services. Additionally, the high attack complexity may limit widespread exploitation, but targeted attacks against high-value organizations remain a concern. The lack of known exploits currently provides a window for mitigation before active exploitation occurs.
Mitigation Recommendations
Organizations should immediately audit their use of Roxnor FundEngine and identify affected versions (up to 1.7.4). Until an official patch is released, implement strict input validation and sanitization on all parameters used in include or require statements to prevent malicious file path manipulation. Employ web application firewalls (WAFs) with rules targeting LFI attack patterns to detect and block suspicious requests. Restrict file system permissions for the web server user to limit access to sensitive files and directories, minimizing the impact of potential LFI exploitation. Monitor logs for unusual file inclusion attempts or errors related to file handling. Consider isolating the FundEngine application in a segmented network zone to reduce lateral movement risk. Engage with Roxnor for timely patch updates and apply them as soon as they become available. Conduct security awareness training for developers and administrators on secure coding practices related to file inclusion. Finally, perform regular vulnerability scanning and penetration testing focused on file inclusion vulnerabilities to proactively identify and remediate issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:13:45.513Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a584b4ad5a09ad0002e2e1
Added to database: 8/20/2025, 8:17:56 AM
Last enriched: 8/20/2025, 9:19:22 AM
Last updated: 10/16/2025, 7:39:20 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61553: n/a
CriticalCVE-2025-11853: Improper Access Controls in Sismics Teedy
MediumCVE-2025-11852: Missing Authentication in Apeman ID71
MediumCVE-2025-11493: CWE-494 Download of Code Without Integrity Check in ConnectWise Automate
HighCVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.