Skip to main content

CVE-2025-49883: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thembay Greenmart

High
VulnerabilityCVE-2025-49883cvecve-2025-49883cwe-98
Published: Fri Jun 27 2025 (06/27/2025, 11:52:31 UTC)
Source: CVE Database V5
Vendor/Project: thembay
Product: Greenmart

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Greenmart allows PHP Local File Inclusion. This issue affects Greenmart: from n/a through 4.2.3.

AI-Powered Analysis

AILast updated: 06/27/2025, 12:30:53 UTC

Technical Analysis

CVE-2025-49883 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the thembay Greenmart product, versions up to and including 4.2.3. The flaw allows for PHP Local File Inclusion (LFI), which means an attacker can manipulate the filename parameter in such a way that arbitrary files on the server can be included and executed within the PHP context. This can lead to remote code execution if an attacker can control the contents of the included files or escalate to full system compromise. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, but it has a high attack complexity, indicating that some conditions or knowledge are needed to exploit it successfully. The CVSS v3.1 score of 8.1 reflects the critical impact on confidentiality, integrity, and availability, as an attacker could read sensitive files, modify application behavior, or cause denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of input used in PHP's include/require statements, allowing attackers to specify unintended file paths. This type of vulnerability is particularly dangerous in web applications as it can lead to full server compromise if exploited effectively.

Potential Impact

For European organizations using thembay Greenmart, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data, including customer information, intellectual property, or internal configuration files. Integrity of the application and data can be compromised, allowing attackers to inject malicious code or alter application logic. Availability may also be affected if attackers cause application crashes or denial of service. Given that Greenmart is an e-commerce or content management related product, disruption or data breaches could result in financial losses, reputational damage, and regulatory penalties under GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the product is widely deployed in European SMEs and enterprises. Organizations relying on Greenmart for online storefronts or digital services must consider this vulnerability a critical threat to their cybersecurity posture.

Mitigation Recommendations

Immediate mitigation should include applying any official patches or updates from thembay once available. In the absence of patches, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent path traversal or injection of arbitrary filenames. Employing web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts can provide temporary protection. Restricting PHP's file inclusion functions via configuration (e.g., disabling allow_url_include and setting open_basedir restrictions) can limit the scope of file inclusion to safe directories. Regularly auditing and reviewing the source code for unsafe dynamic includes is recommended. Additionally, monitoring logs for unusual access patterns or errors related to file inclusion can help detect exploitation attempts early. Organizations should also consider isolating Greenmart instances in segmented network zones to reduce lateral movement if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:06:15.666Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685e88eeca1063fb875de4ed

Added to database: 6/27/2025, 12:05:02 PM

Last enriched: 6/27/2025, 12:30:53 PM

Last updated: 8/15/2025, 6:37:04 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats