Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49364: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Ludos Paradise

0
High
VulnerabilityCVE-2025-49364cvecve-2025-49364
Published: Thu Dec 18 2025 (12/18/2025, 07:21:42 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Ludos Paradise

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Ludos Paradise ludos-paradise allows PHP Local File Inclusion.This issue affects Ludos Paradise: from n/a through <= 2.1.3.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:03:01 UTC

Technical Analysis

CVE-2025-49364 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically affecting the AncoraThemes Ludos Paradise WordPress theme versions up to 2.1.3. The vulnerability manifests as a Local File Inclusion (LFI) flaw, where the application fails to properly sanitize or validate user-supplied input used in PHP include or require statements. This improper control allows an attacker to manipulate the filename parameter to include arbitrary files from the local filesystem. Although the description mentions 'PHP Remote File Inclusion,' the actual issue is a Local File Inclusion, meaning the attacker can only include files present on the server, not remote files. Exploiting this vulnerability requires no authentication but does require user interaction, such as visiting a crafted URL. The impact includes disclosure of sensitive files (e.g., configuration files, source code), which can lead to further attacks like credential theft or privilege escalation. The CVSS v3.1 score is 8.1 (high), reflecting the vulnerability's ease of exploitation over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The confidentiality and integrity impacts are high, while availability is unaffected. No known public exploits are reported yet, but the vulnerability's nature makes it a significant risk for websites using this theme. AncoraThemes has not yet published a patch or mitigation guidance at the time of this report.

Potential Impact

For European organizations, especially those operating WordPress sites with the Ludos Paradise theme, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized disclosure of sensitive information such as database credentials, configuration files, or user data, compromising confidentiality. Attackers may also manipulate included files to alter site behavior, impacting data integrity. Although availability is not directly affected, the breach of confidentiality and integrity can lead to reputational damage, regulatory penalties under GDPR, and potential lateral movement within the network. Sectors such as gaming, entertainment, and digital media, which are common users of AncoraThemes products, may be particularly targeted. The vulnerability's network-exploitable nature means attackers can attempt exploitation remotely, increasing the threat surface. European organizations with limited patch management processes or those unaware of this theme's vulnerabilities are at higher risk. The absence of known exploits currently provides a window for proactive mitigation.

Mitigation Recommendations

1. Monitor AncoraThemes official channels for a security patch or update addressing CVE-2025-49364 and apply it immediately upon release. 2. In the interim, restrict PHP include paths by configuring open_basedir and disable allow_url_include in PHP settings to limit file inclusion scope. 3. Employ a Web Application Firewall (WAF) with rules designed to detect and block Local File Inclusion attack patterns, such as suspicious URL parameters containing directory traversal sequences. 4. Conduct a thorough audit of all user-controllable inputs that influence file inclusion and implement strict input validation and sanitization. 5. Limit user interaction vectors by educating users and administrators about phishing or social engineering attempts that might lead to exploitation. 6. Regularly back up website data and configurations to enable quick recovery if compromise occurs. 7. Review server and application logs for unusual access patterns or errors indicative of attempted exploitation. 8. Consider isolating the affected web application environment to minimize impact in case of a breach.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:48.971Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0374eb3efac366ff1b7

Added to database: 12/18/2025, 7:41:43 AM

Last enriched: 1/20/2026, 8:03:01 PM

Last updated: 2/4/2026, 7:49:01 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats