CVE-2025-49251: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thembay Fana
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Fana allows PHP Local File Inclusion. This issue affects Fana: from n/a through 1.1.28.
AI Analysis
Technical Summary
CVE-2025-49251 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the thembay Fana product, versions up to 1.1.28. The flaw allows for PHP Local File Inclusion (LFI), a type of attack where an adversary can manipulate the filename parameter to include unintended files on the server. Although the description references 'PHP Remote File Inclusion,' the actual impact is local file inclusion, which can still lead to significant security risks. Exploiting this vulnerability could enable an attacker to read sensitive files, execute arbitrary PHP code, or escalate privileges by including malicious scripts or configuration files. The CVSS v3.1 base score is 8.1, indicating a high severity with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network without authentication or user interaction but requires high attack complexity. The vulnerability impacts confidentiality, integrity, and availability, potentially allowing full system compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 17, 2025, and reserved on June 4, 2025. The lack of available patches suggests that affected organizations should prioritize mitigation and monitoring until official fixes are released.
Potential Impact
For European organizations using thembay Fana, this vulnerability poses a significant risk. Given the high CVSS score and the ability to remotely exploit the flaw without authentication or user interaction, attackers could gain unauthorized access to sensitive data, modify or delete critical files, and disrupt services. This could lead to data breaches involving personal data protected under GDPR, causing regulatory penalties and reputational damage. Organizations in sectors such as e-commerce, media, and web hosting—where PHP-based CMS or frameworks like thembay Fana might be deployed—are particularly vulnerable. The attack complexity is high, which may limit widespread exploitation initially, but motivated threat actors could still leverage this vulnerability in targeted attacks. The absence of known exploits in the wild provides a window for proactive defense, but the potential impact on confidentiality, integrity, and availability remains severe. Additionally, the vulnerability could be chained with other exploits to achieve full system compromise or lateral movement within networks.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to vulnerable PHP scripts by implementing strict web application firewall (WAF) rules that detect and block suspicious include or require parameter manipulations. 2. Employ input validation and sanitization on all user-supplied parameters that influence file inclusion paths, ensuring only whitelisted or fixed filenames are accepted. 3. Disable allow_url_include and allow_url_fopen directives in PHP configurations to prevent remote file inclusion vectors. 4. Use PHP open_basedir restrictions to limit the directories accessible by PHP scripts, reducing the risk of including unintended files. 5. Monitor web server and application logs for unusual requests attempting to exploit file inclusion, such as those containing directory traversal sequences or unexpected file extensions. 6. Until an official patch is released, consider isolating or segmenting systems running thembay Fana to minimize potential lateral movement. 7. Engage with the vendor or community for updates and apply patches promptly once available. 8. Conduct code audits on customizations or plugins that interact with file inclusion mechanisms to identify and remediate insecure coding practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-49251: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thembay Fana
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Fana allows PHP Local File Inclusion. This issue affects Fana: from n/a through 1.1.28.
AI-Powered Analysis
Technical Analysis
CVE-2025-49251 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the thembay Fana product, versions up to 1.1.28. The flaw allows for PHP Local File Inclusion (LFI), a type of attack where an adversary can manipulate the filename parameter to include unintended files on the server. Although the description references 'PHP Remote File Inclusion,' the actual impact is local file inclusion, which can still lead to significant security risks. Exploiting this vulnerability could enable an attacker to read sensitive files, execute arbitrary PHP code, or escalate privileges by including malicious scripts or configuration files. The CVSS v3.1 base score is 8.1, indicating a high severity with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network without authentication or user interaction but requires high attack complexity. The vulnerability impacts confidentiality, integrity, and availability, potentially allowing full system compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 17, 2025, and reserved on June 4, 2025. The lack of available patches suggests that affected organizations should prioritize mitigation and monitoring until official fixes are released.
Potential Impact
For European organizations using thembay Fana, this vulnerability poses a significant risk. Given the high CVSS score and the ability to remotely exploit the flaw without authentication or user interaction, attackers could gain unauthorized access to sensitive data, modify or delete critical files, and disrupt services. This could lead to data breaches involving personal data protected under GDPR, causing regulatory penalties and reputational damage. Organizations in sectors such as e-commerce, media, and web hosting—where PHP-based CMS or frameworks like thembay Fana might be deployed—are particularly vulnerable. The attack complexity is high, which may limit widespread exploitation initially, but motivated threat actors could still leverage this vulnerability in targeted attacks. The absence of known exploits in the wild provides a window for proactive defense, but the potential impact on confidentiality, integrity, and availability remains severe. Additionally, the vulnerability could be chained with other exploits to achieve full system compromise or lateral movement within networks.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to vulnerable PHP scripts by implementing strict web application firewall (WAF) rules that detect and block suspicious include or require parameter manipulations. 2. Employ input validation and sanitization on all user-supplied parameters that influence file inclusion paths, ensuring only whitelisted or fixed filenames are accepted. 3. Disable allow_url_include and allow_url_fopen directives in PHP configurations to prevent remote file inclusion vectors. 4. Use PHP open_basedir restrictions to limit the directories accessible by PHP scripts, reducing the risk of including unintended files. 5. Monitor web server and application logs for unusual requests attempting to exploit file inclusion, such as those containing directory traversal sequences or unexpected file extensions. 6. Until an official patch is released, consider isolating or segmenting systems running thembay Fana to minimize potential lateral movement. 7. Engage with the vendor or community for updates and apply patches promptly once available. 8. Conduct code audits on customizations or plugins that interact with file inclusion mechanisms to identify and remediate insecure coding practices.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:41:05.254Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68518789a8c921274385df1e
Added to database: 6/17/2025, 3:19:37 PM
Last enriched: 6/17/2025, 4:04:32 PM
Last updated: 1/7/2026, 8:55:18 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.