CVE-2025-49036: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in octagonwebstudio Premium Addons for KingComposer
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in octagonwebstudio Premium Addons for KingComposer allows PHP Local File Inclusion. This issue affects Premium Addons for KingComposer: from n/a through 1.1.1.
AI Analysis
Technical Summary
CVE-2025-49036 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Premium Addons for KingComposer developed by octagonwebstudio, versions up to 1.1.1. The flaw allows an attacker to perform PHP Local File Inclusion (LFI), which can lead to arbitrary code execution, data disclosure, and full compromise of the affected web application. The vulnerability arises because the application does not properly validate or sanitize user-supplied input used in PHP include or require statements, enabling an attacker to manipulate the filename parameter to include unintended files from the server. This can result in disclosure of sensitive files such as configuration files, password stores, or application source code. In some cases, it can also lead to remote code execution if the attacker can control the contents of included files or upload malicious files to the server. The CVSS v3.1 base score of 8.1 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk for affected installations. No patches or mitigation links are currently provided by the vendor, which increases the urgency for organizations to apply compensating controls or monitor for exploitation attempts.
Potential Impact
For European organizations using the Premium Addons for KingComposer, this vulnerability poses a critical risk to the confidentiality, integrity, and availability of their web applications and underlying systems. Successful exploitation could lead to unauthorized access to sensitive customer data, intellectual property, or internal configuration files, potentially violating GDPR and other data protection regulations. The integrity of web content and backend systems could be compromised, enabling attackers to inject malicious code, deface websites, or pivot to internal networks. Availability could also be impacted if attackers disrupt services or delete critical files. Given the widespread use of WordPress and its plugins in Europe, organizations in sectors such as e-commerce, government, education, and media that rely on KingComposer with Premium Addons are particularly vulnerable. The lack of patches and the high CVSS score indicate that attackers motivated by financial gain or espionage could target these systems, leading to reputational damage, regulatory fines, and operational disruption.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the Premium Addons for KingComposer plugin until a vendor patch is available. 2. Implement strict input validation and sanitization on all user-supplied parameters that influence file inclusion paths. 3. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit LFI patterns, such as directory traversal sequences or suspicious include parameters. 4. Restrict PHP include paths and disable allow_url_include and allow_url_fopen directives in the PHP configuration to prevent remote file inclusion vectors. 5. Conduct thorough code reviews and penetration testing focused on file inclusion vulnerabilities in all custom or third-party plugins. 6. Monitor web server and application logs for anomalous requests indicative of LFI exploitation attempts. 7. Maintain regular backups and ensure incident response plans are updated to handle potential breaches stemming from this vulnerability. 8. Engage with the vendor or community to track patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-49036: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in octagonwebstudio Premium Addons for KingComposer
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in octagonwebstudio Premium Addons for KingComposer allows PHP Local File Inclusion. This issue affects Premium Addons for KingComposer: from n/a through 1.1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-49036 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Premium Addons for KingComposer developed by octagonwebstudio, versions up to 1.1.1. The flaw allows an attacker to perform PHP Local File Inclusion (LFI), which can lead to arbitrary code execution, data disclosure, and full compromise of the affected web application. The vulnerability arises because the application does not properly validate or sanitize user-supplied input used in PHP include or require statements, enabling an attacker to manipulate the filename parameter to include unintended files from the server. This can result in disclosure of sensitive files such as configuration files, password stores, or application source code. In some cases, it can also lead to remote code execution if the attacker can control the contents of included files or upload malicious files to the server. The CVSS v3.1 base score of 8.1 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk for affected installations. No patches or mitigation links are currently provided by the vendor, which increases the urgency for organizations to apply compensating controls or monitor for exploitation attempts.
Potential Impact
For European organizations using the Premium Addons for KingComposer, this vulnerability poses a critical risk to the confidentiality, integrity, and availability of their web applications and underlying systems. Successful exploitation could lead to unauthorized access to sensitive customer data, intellectual property, or internal configuration files, potentially violating GDPR and other data protection regulations. The integrity of web content and backend systems could be compromised, enabling attackers to inject malicious code, deface websites, or pivot to internal networks. Availability could also be impacted if attackers disrupt services or delete critical files. Given the widespread use of WordPress and its plugins in Europe, organizations in sectors such as e-commerce, government, education, and media that rely on KingComposer with Premium Addons are particularly vulnerable. The lack of patches and the high CVSS score indicate that attackers motivated by financial gain or espionage could target these systems, leading to reputational damage, regulatory fines, and operational disruption.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the Premium Addons for KingComposer plugin until a vendor patch is available. 2. Implement strict input validation and sanitization on all user-supplied parameters that influence file inclusion paths. 3. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit LFI patterns, such as directory traversal sequences or suspicious include parameters. 4. Restrict PHP include paths and disable allow_url_include and allow_url_fopen directives in the PHP configuration to prevent remote file inclusion vectors. 5. Conduct thorough code reviews and penetration testing focused on file inclusion vulnerabilities in all custom or third-party plugins. 6. Monitor web server and application logs for anomalous requests indicative of LFI exploitation attempts. 7. Maintain regular backups and ensure incident response plans are updated to handle potential breaches stemming from this vulnerability. 8. Engage with the vendor or community to track patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-30T14:04:14.280Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689dbee1ad5a09ad0059e5b8
Added to database: 8/14/2025, 10:48:01 AM
Last enriched: 8/14/2025, 12:03:46 PM
Last updated: 8/21/2025, 12:35:15 AM
Views: 1
Related Threats
CVE-2025-58361: CWE-20: Improper Input Validation in MarceloTessaro promptcraft-forge-studio
CriticalCVE-2025-58353: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MarceloTessaro promptcraft-forge-studio
HighCVE-2025-32322: Elevation of privilege in Google Android
HighCVE-2025-22415: Elevation of privilege in Google Android
HighCVE-2025-22414: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.