Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49363: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Kings & Queens

0
High
VulnerabilityCVE-2025-49363cvecve-2025-49363
Published: Thu Dec 18 2025 (12/18/2025, 07:21:41 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Kings & Queens

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Kings & Queens kings-queens allows PHP Local File Inclusion.This issue affects Kings & Queens: from n/a through <= 1.1.16.

AI-Powered Analysis

AILast updated: 12/18/2025, 09:58:38 UTC

Technical Analysis

CVE-2025-49363 is a vulnerability classified as Remote File Inclusion (RFI) in the AncoraThemes Kings & Queens WordPress theme, specifically affecting versions up to and including 1.1.16. The vulnerability stems from improper validation and control of filenames used in PHP include or require statements. This flaw allows an attacker to manipulate the filename parameter to include arbitrary files, potentially from remote sources, leading to remote code execution on the server hosting the vulnerable theme. The vulnerability is categorized as PHP Local File Inclusion but can be exploited remotely if the application does not properly sanitize input. This can enable attackers to execute malicious PHP code, steal sensitive data, modify website content, or pivot further into the network. The vulnerability was reserved in June 2025 and published in December 2025, with no CVSS score assigned yet and no known exploits in the wild. The affected product is a WordPress theme, which is widely used in websites, increasing the attack surface. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for proactive mitigation. The vulnerability impacts the confidentiality, integrity, and availability of affected web servers and their hosted applications.

Potential Impact

For European organizations, the impact of CVE-2025-49363 can be severe. Many businesses and institutions in Europe rely on WordPress for their web presence, including e-commerce, media, and government sites. Exploitation could lead to unauthorized access to sensitive customer data, defacement of websites, disruption of services, and use of compromised servers as a foothold for further attacks within corporate networks. The breach of confidentiality could result in GDPR violations with significant fines. Integrity loss could damage brand reputation and trust. Availability impacts could disrupt business operations and customer interactions. Since the vulnerability allows remote code execution without authentication, attackers can exploit it at scale, increasing the risk of widespread compromise. The absence of known exploits currently provides a window for mitigation, but the threat remains critical due to the nature of the vulnerability.

Mitigation Recommendations

1. Monitor AncoraThemes and WordPress security advisories for official patches and apply them immediately upon release. 2. Until patches are available, disable or remove the Kings & Queens theme if it is not essential. 3. Implement strict input validation and sanitization on all parameters that influence file inclusion paths. 4. Configure PHP settings to disable allow_url_include and restrict include_path to trusted directories only. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. 6. Conduct regular security audits and code reviews of custom themes and plugins to identify similar vulnerabilities. 7. Maintain up-to-date backups and incident response plans to recover quickly in case of compromise. 8. Limit file permissions on the web server to prevent unauthorized file modifications. 9. Educate web administrators on secure theme management and the risks of using outdated or untrusted themes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:41.321Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0354eb3efac366fee44

Added to database: 12/18/2025, 7:41:41 AM

Last enriched: 12/18/2025, 9:58:38 AM

Last updated: 12/19/2025, 9:13:40 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats