CVE-2025-49365: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Jack Well
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Jack Well jack-well allows PHP Local File Inclusion.This issue affects Jack Well: from n/a through <= 1.0.14.
AI Analysis
Technical Summary
CVE-2025-49365 identifies a Local File Inclusion (LFI) vulnerability in the AncoraThemes Jack Well WordPress theme, versions up to 1.0.14. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary local files on the web server. This can lead to unauthorized disclosure of sensitive files such as configuration files, password files, or application source code. In some scenarios, LFI can be leveraged to execute arbitrary code if combined with other vulnerabilities or if the attacker can upload malicious files. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits are currently reported, the flaw is publicly disclosed and could be weaponized by attackers targeting vulnerable WordPress sites. The lack of an official patch at the time of publication means that affected sites remain exposed. AncoraThemes Jack Well is a commercial WordPress theme, and its usage in European markets is notable among small to medium enterprises and niche websites. The vulnerability is classified as a PHP Remote File Inclusion type but specifically manifests as Local File Inclusion due to improper filename control in PHP include/require statements.
Potential Impact
For European organizations, exploitation of this vulnerability could result in significant confidentiality breaches through unauthorized access to sensitive files, including credentials, configuration data, and proprietary information. Integrity of the affected systems could be compromised if attackers manage to execute arbitrary code, potentially leading to website defacement, malware deployment, or pivoting within the network. Availability might also be impacted if attackers disrupt web services or cause application crashes. Organizations relying on the Jack Well theme for customer-facing websites, e-commerce, or internal portals could suffer reputational damage and regulatory consequences under GDPR due to data exposure. The threat is particularly concerning for sectors with high reliance on WordPress CMS, such as SMEs, media, and public institutions. The absence of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the risk of imminent exploitation attempts.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify usage of the AncoraThemes Jack Well theme, especially versions up to 1.0.14. Until an official patch is released, administrators should restrict web server permissions to limit file access and disable PHP functions that allow file inclusion if feasible. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations can reduce attack surface. Input validation and sanitization should be enforced at the application level to prevent malicious filename inputs. Monitoring web server logs for anomalous requests targeting include parameters can provide early detection of exploitation attempts. Organizations should also plan for rapid deployment of patches once available and consider isolating vulnerable sites or migrating to alternative themes with secure coding practices. Regular backups and incident response plans should be updated to address potential exploitation scenarios.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands
CVE-2025-49365: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Jack Well
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Jack Well jack-well allows PHP Local File Inclusion.This issue affects Jack Well: from n/a through <= 1.0.14.
AI-Powered Analysis
Technical Analysis
CVE-2025-49365 identifies a Local File Inclusion (LFI) vulnerability in the AncoraThemes Jack Well WordPress theme, versions up to 1.0.14. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary local files on the web server. This can lead to unauthorized disclosure of sensitive files such as configuration files, password files, or application source code. In some scenarios, LFI can be leveraged to execute arbitrary code if combined with other vulnerabilities or if the attacker can upload malicious files. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits are currently reported, the flaw is publicly disclosed and could be weaponized by attackers targeting vulnerable WordPress sites. The lack of an official patch at the time of publication means that affected sites remain exposed. AncoraThemes Jack Well is a commercial WordPress theme, and its usage in European markets is notable among small to medium enterprises and niche websites. The vulnerability is classified as a PHP Remote File Inclusion type but specifically manifests as Local File Inclusion due to improper filename control in PHP include/require statements.
Potential Impact
For European organizations, exploitation of this vulnerability could result in significant confidentiality breaches through unauthorized access to sensitive files, including credentials, configuration data, and proprietary information. Integrity of the affected systems could be compromised if attackers manage to execute arbitrary code, potentially leading to website defacement, malware deployment, or pivoting within the network. Availability might also be impacted if attackers disrupt web services or cause application crashes. Organizations relying on the Jack Well theme for customer-facing websites, e-commerce, or internal portals could suffer reputational damage and regulatory consequences under GDPR due to data exposure. The threat is particularly concerning for sectors with high reliance on WordPress CMS, such as SMEs, media, and public institutions. The absence of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the risk of imminent exploitation attempts.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify usage of the AncoraThemes Jack Well theme, especially versions up to 1.0.14. Until an official patch is released, administrators should restrict web server permissions to limit file access and disable PHP functions that allow file inclusion if feasible. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations can reduce attack surface. Input validation and sanitization should be enforced at the application level to prevent malicious filename inputs. Monitoring web server logs for anomalous requests targeting include parameters can provide early detection of exploitation attempts. Organizations should also plan for rapid deployment of patches once available and consider isolating vulnerable sites or migrating to alternative themes with secure coding practices. Regular backups and incident response plans should be updated to address potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:42:48.971Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0374eb3efac366ff1ba
Added to database: 12/18/2025, 7:41:43 AM
Last enriched: 12/18/2025, 9:58:10 AM
Last updated: 12/19/2025, 6:56:31 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14267: CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer in M-Files Corporation M-Files Server
MediumCVE-2025-13307: CWE-94 Improper Control of Generation of Code ('Code Injection') in Ocean Modal Window
CriticalCVE-2025-14546: Cross-site Request Forgery (CSRF) in fastapi-sso
MediumCVE-2025-68491
UnknownCVE-2025-68490
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.