Skip to main content

CVE-2025-49383: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in CocoBasic Neresa

High
VulnerabilityCVE-2025-49383cvecve-2025-49383cwe-98
Published: Thu Aug 28 2025 (08/28/2025, 12:37:12 UTC)
Source: CVE Database V5
Vendor/Project: CocoBasic
Product: Neresa

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CocoBasic Neresa allows PHP Local File Inclusion. This issue affects Neresa: from n/a through 1.3.

AI-Powered Analysis

AILast updated: 08/28/2025, 13:47:45 UTC

Technical Analysis

CVE-2025-49383 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP applications. Specifically, this vulnerability affects the CocoBasic Neresa product, versions up to 1.3. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter used in include or require statements. This can lead to the inclusion and execution of arbitrary local files on the server. Such vulnerabilities arise when user input is not properly sanitized or validated before being used in file inclusion functions, enabling attackers to traverse directories or specify unintended files. The CVSS v3.1 score of 8.1 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution, data disclosure, and system compromise. The absence of available patches at the time of publication increases the urgency for mitigation and risk management.

Potential Impact

For European organizations using CocoBasic Neresa, this vulnerability could lead to severe consequences including unauthorized access to sensitive data, execution of arbitrary code, and potential full system compromise. Given the high CVSS score, exploitation could disrupt business operations, lead to data breaches involving personal or proprietary information, and cause reputational damage. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) are particularly at risk, as exploitation could result in regulatory penalties. The vulnerability’s network accessibility and lack of required authentication make it a viable target for remote attackers, increasing the likelihood of exploitation in environments where Neresa is deployed. Additionally, the ability to include local files may allow attackers to escalate privileges or pivot within the network, amplifying the impact.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the affected application from untrusted networks using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on all parameters used in include or require statements to ensure only intended files can be included. 3. Employ PHP configuration best practices such as disabling allow_url_include and setting open_basedir restrictions to limit file inclusion to designated directories. 4. Monitor application logs for suspicious file inclusion attempts or unusual access patterns. 5. If possible, upgrade to a fixed version of Neresa once patches are released by the vendor. 6. As a temporary workaround, consider disabling or restricting the vulnerable functionality if it is not critical to operations. 7. Conduct a thorough security review and penetration testing focused on file inclusion vulnerabilities to identify and remediate similar issues. 8. Educate development teams on secure coding practices related to file handling in PHP to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:56.995Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b0537fad5a09ad006cfce6

Added to database: 8/28/2025, 1:02:55 PM

Last enriched: 8/28/2025, 1:47:45 PM

Last updated: 9/4/2025, 12:34:41 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats