Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49365: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Jack Well

0
High
VulnerabilityCVE-2025-49365cvecve-2025-49365
Published: Thu Dec 18 2025 (12/18/2025, 07:21:42 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Jack Well

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Jack Well jack-well allows PHP Local File Inclusion.This issue affects Jack Well: from n/a through <= 1.0.14.

AI-Powered Analysis

AILast updated: 12/18/2025, 09:58:10 UTC

Technical Analysis

CVE-2025-49365 identifies a Local File Inclusion (LFI) vulnerability in the AncoraThemes Jack Well WordPress theme, versions up to 1.0.14. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary local files on the web server. This can lead to unauthorized disclosure of sensitive files such as configuration files, password files, or application source code. In some scenarios, LFI can be leveraged to execute arbitrary code if combined with other vulnerabilities or if the attacker can upload malicious files. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits are currently reported, the flaw is publicly disclosed and could be weaponized by attackers targeting vulnerable WordPress sites. The lack of an official patch at the time of publication means that affected sites remain exposed. AncoraThemes Jack Well is a commercial WordPress theme, and its usage in European markets is notable among small to medium enterprises and niche websites. The vulnerability is classified as a PHP Remote File Inclusion type but specifically manifests as Local File Inclusion due to improper filename control in PHP include/require statements.

Potential Impact

For European organizations, exploitation of this vulnerability could result in significant confidentiality breaches through unauthorized access to sensitive files, including credentials, configuration data, and proprietary information. Integrity of the affected systems could be compromised if attackers manage to execute arbitrary code, potentially leading to website defacement, malware deployment, or pivoting within the network. Availability might also be impacted if attackers disrupt web services or cause application crashes. Organizations relying on the Jack Well theme for customer-facing websites, e-commerce, or internal portals could suffer reputational damage and regulatory consequences under GDPR due to data exposure. The threat is particularly concerning for sectors with high reliance on WordPress CMS, such as SMEs, media, and public institutions. The absence of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the risk of imminent exploitation attempts.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify usage of the AncoraThemes Jack Well theme, especially versions up to 1.0.14. Until an official patch is released, administrators should restrict web server permissions to limit file access and disable PHP functions that allow file inclusion if feasible. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations can reduce attack surface. Input validation and sanitization should be enforced at the application level to prevent malicious filename inputs. Monitoring web server logs for anomalous requests targeting include parameters can provide early detection of exploitation attempts. Organizations should also plan for rapid deployment of patches once available and consider isolating vulnerable sites or migrating to alternative themes with secure coding practices. Regular backups and incident response plans should be updated to address potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:48.971Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0374eb3efac366ff1ba

Added to database: 12/18/2025, 7:41:43 AM

Last enriched: 12/18/2025, 9:58:10 AM

Last updated: 12/19/2025, 6:56:31 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats