CVE-2025-49383: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in CocoBasic Neresa
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CocoBasic Neresa allows PHP Local File Inclusion. This issue affects Neresa: from n/a through 1.3.
AI Analysis
Technical Summary
CVE-2025-49383 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP applications. Specifically, this vulnerability affects the CocoBasic Neresa product, versions up to 1.3. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter used in include or require statements. This can lead to the inclusion and execution of arbitrary local files on the server. Such vulnerabilities arise when user input is not properly sanitized or validated before being used in file inclusion functions, enabling attackers to traverse directories or specify unintended files. The CVSS v3.1 score of 8.1 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution, data disclosure, and system compromise. The absence of available patches at the time of publication increases the urgency for mitigation and risk management.
Potential Impact
For European organizations using CocoBasic Neresa, this vulnerability could lead to severe consequences including unauthorized access to sensitive data, execution of arbitrary code, and potential full system compromise. Given the high CVSS score, exploitation could disrupt business operations, lead to data breaches involving personal or proprietary information, and cause reputational damage. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) are particularly at risk, as exploitation could result in regulatory penalties. The vulnerability’s network accessibility and lack of required authentication make it a viable target for remote attackers, increasing the likelihood of exploitation in environments where Neresa is deployed. Additionally, the ability to include local files may allow attackers to escalate privileges or pivot within the network, amplifying the impact.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the affected application from untrusted networks using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on all parameters used in include or require statements to ensure only intended files can be included. 3. Employ PHP configuration best practices such as disabling allow_url_include and setting open_basedir restrictions to limit file inclusion to designated directories. 4. Monitor application logs for suspicious file inclusion attempts or unusual access patterns. 5. If possible, upgrade to a fixed version of Neresa once patches are released by the vendor. 6. As a temporary workaround, consider disabling or restricting the vulnerable functionality if it is not critical to operations. 7. Conduct a thorough security review and penetration testing focused on file inclusion vulnerabilities to identify and remediate similar issues. 8. Educate development teams on secure coding practices related to file handling in PHP to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-49383: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in CocoBasic Neresa
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CocoBasic Neresa allows PHP Local File Inclusion. This issue affects Neresa: from n/a through 1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-49383 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP applications. Specifically, this vulnerability affects the CocoBasic Neresa product, versions up to 1.3. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter used in include or require statements. This can lead to the inclusion and execution of arbitrary local files on the server. Such vulnerabilities arise when user input is not properly sanitized or validated before being used in file inclusion functions, enabling attackers to traverse directories or specify unintended files. The CVSS v3.1 score of 8.1 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, no user interaction, but high attack complexity. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution, data disclosure, and system compromise. The absence of available patches at the time of publication increases the urgency for mitigation and risk management.
Potential Impact
For European organizations using CocoBasic Neresa, this vulnerability could lead to severe consequences including unauthorized access to sensitive data, execution of arbitrary code, and potential full system compromise. Given the high CVSS score, exploitation could disrupt business operations, lead to data breaches involving personal or proprietary information, and cause reputational damage. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) are particularly at risk, as exploitation could result in regulatory penalties. The vulnerability’s network accessibility and lack of required authentication make it a viable target for remote attackers, increasing the likelihood of exploitation in environments where Neresa is deployed. Additionally, the ability to include local files may allow attackers to escalate privileges or pivot within the network, amplifying the impact.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the affected application from untrusted networks using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on all parameters used in include or require statements to ensure only intended files can be included. 3. Employ PHP configuration best practices such as disabling allow_url_include and setting open_basedir restrictions to limit file inclusion to designated directories. 4. Monitor application logs for suspicious file inclusion attempts or unusual access patterns. 5. If possible, upgrade to a fixed version of Neresa once patches are released by the vendor. 6. As a temporary workaround, consider disabling or restricting the vulnerable functionality if it is not critical to operations. 7. Conduct a thorough security review and penetration testing focused on file inclusion vulnerabilities to identify and remediate similar issues. 8. Educate development teams on secure coding practices related to file handling in PHP to prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:42:56.995Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b0537fad5a09ad006cfce6
Added to database: 8/28/2025, 1:02:55 PM
Last enriched: 8/28/2025, 1:47:45 PM
Last updated: 9/4/2025, 12:34:41 AM
Views: 19
Related Threats
CVE-2025-43772: CWE-400 Uncontrolled Resource Consumption in Liferay Portal
HighCVE-2025-9942: Unrestricted Upload in CodeAstro Real Estate Management System
MediumCVE-2025-9941: Unrestricted Upload in CodeAstro Real Estate Management System
MediumCVE-2025-58358: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zcaceres markdownify-mcp
HighCVE-2025-58357: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nanbingxyz 5ire
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.