Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49363: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Kings & Queens

0
High
VulnerabilityCVE-2025-49363cvecve-2025-49363
Published: Thu Dec 18 2025 (12/18/2025, 07:21:41 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Kings & Queens

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Kings & Queens kings-queens allows PHP Local File Inclusion.This issue affects Kings & Queens: from n/a through <= 1.1.16.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:02:47 UTC

Technical Analysis

CVE-2025-49363 is a remote file inclusion (RFI) vulnerability found in the AncoraThemes Kings & Queens PHP theme, affecting versions up to 1.1.16. The root cause is improper control over the filename parameter used in PHP include or require statements, which allows an attacker to supply a crafted filename that the application will include and execute. This flaw enables remote attackers to execute arbitrary PHP code on the server by including malicious files hosted remotely or locally, leading to full compromise of the web server environment. The vulnerability does not require authentication but does require some user interaction, such as visiting a crafted URL. The CVSS v3.1 score is 8.1 (high), reflecting the ease of network exploitation, lack of required privileges, and the high impact on confidentiality and integrity. No known exploits are currently reported in the wild, and no official patches have been released yet. However, the vulnerability poses a significant risk to any web server running the affected theme, especially those exposed to the internet. The vulnerability is categorized under improper control of file inclusion, a common and dangerous web application security issue that can lead to remote code execution and data breaches.

Potential Impact

For European organizations, this vulnerability presents a critical risk to web applications using the AncoraThemes Kings & Queens theme, potentially leading to unauthorized access, data theft, and full server compromise. Confidentiality is severely impacted as attackers can execute arbitrary code and access sensitive data. Integrity is also compromised since attackers can modify files or inject malicious scripts. Although availability is not directly affected, the overall system stability could be undermined by malicious payloads. Organizations in sectors such as e-commerce, government, healthcare, and finance that rely on PHP-based CMS platforms are particularly vulnerable. Exploitation could lead to regulatory non-compliance under GDPR due to data breaches. The lack of patches increases the urgency for proactive mitigation. The threat landscape in Europe, with widespread use of PHP and WordPress themes, means many organizations could be exposed, especially those that do not regularly update or audit third-party themes.

Mitigation Recommendations

1. Immediately audit all web applications using the AncoraThemes Kings & Queens theme and identify affected versions (<=1.1.16). 2. Restrict or sanitize all user inputs that influence include/require statements to prevent arbitrary file inclusion. Implement whitelisting of allowed filenames or paths. 3. Disable allow_url_include in PHP configuration to prevent remote file inclusion. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts or unusual URL parameters. 5. Monitor web server logs for anomalous requests that attempt to exploit file inclusion. 6. If possible, temporarily disable or replace the vulnerable theme until a patch is released. 7. Educate developers and administrators on secure coding practices related to file inclusion. 8. Plan for timely patching once an official update is available from AncoraThemes. 9. Conduct penetration testing focused on file inclusion vulnerabilities to verify mitigation effectiveness. 10. Implement strict access controls and segmentation to limit the impact of potential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:41.321Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0354eb3efac366fee44

Added to database: 12/18/2025, 7:41:41 AM

Last enriched: 1/20/2026, 8:02:47 PM

Last updated: 2/7/2026, 8:30:09 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats