Skip to main content

CVE-2025-49280: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Unfoldwp Magty

High
VulnerabilityCVE-2025-49280cvecve-2025-49280cwe-98
Published: Mon Jun 09 2025 (06/09/2025, 15:53:48 UTC)
Source: CVE Database V5
Vendor/Project: Unfoldwp
Product: Magty

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Unfoldwp Magty allows PHP Local File Inclusion. This issue affects Magty: from n/a through 1.0.6.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:47:22 UTC

Technical Analysis

CVE-2025-49280 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. This specific vulnerability affects the Unfoldwp Magty product, versions up to and including 1.0.6. The flaw allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter to include arbitrary files from the local filesystem into the PHP execution context. This can lead to the execution of malicious code, disclosure of sensitive files, or complete system compromise. The vulnerability arises because the application does not properly validate or sanitize the input used in include/require statements, allowing attackers to traverse directories or specify unintended files. The CVSS v3.1 score is 8.1, indicating a high severity with network attack vector, high attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a critical risk if weaponized. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those using the Unfoldwp Magty CMS or related PHP-based web applications. Successful exploitation can lead to unauthorized disclosure of sensitive data, including configuration files, user credentials, or intellectual property. It can also allow attackers to execute arbitrary code, potentially leading to full system compromise, defacement, or use of the compromised server as a pivot point for further attacks within the network. This can disrupt business operations, damage reputation, and result in regulatory non-compliance, particularly under GDPR where data breaches must be reported. Given the network attack vector and no requirement for authentication or user interaction, attackers can remotely exploit this vulnerability, increasing the risk of widespread attacks against vulnerable web servers. The high impact on confidentiality, integrity, and availability makes it a critical concern for organizations hosting public-facing web services or internal applications accessible over the network.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting the use of dynamic include/require statements that accept user input in the affected Magty versions. 2. Implement strict input validation and sanitization to ensure only allowed filenames or paths are processed, using whitelisting approaches. 3. Employ web application firewalls (WAFs) with rules designed to detect and block attempts to exploit LFI vulnerabilities, such as directory traversal patterns. 4. Restrict file system permissions for the web server user to limit access to sensitive files and directories, minimizing the impact of potential LFI exploitation. 5. Monitor web server logs and application logs for suspicious requests that attempt to manipulate include parameters or access unusual files. 6. Plan and prioritize upgrading to a patched version of Magty once available or apply vendor-provided patches promptly. 7. Consider isolating vulnerable applications in segmented network zones to reduce lateral movement risks. 8. Conduct regular security assessments and code reviews focusing on file inclusion mechanisms in PHP applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:41:31.235Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5a1b0bd07c3938b455

Added to database: 6/10/2025, 6:54:18 PM

Last enriched: 7/10/2025, 10:47:22 PM

Last updated: 8/9/2025, 2:41:24 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats