CVE-2025-49883: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thembay Greenmart
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Greenmart allows PHP Local File Inclusion. This issue affects Greenmart: from n/a through 4.2.3.
AI Analysis
Technical Summary
CVE-2025-49883 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the thembay Greenmart product, versions up to and including 4.2.3. The flaw allows for PHP Local File Inclusion (LFI), which means an attacker can manipulate the filename parameter in such a way that arbitrary files on the server can be included and executed within the PHP context. This can lead to remote code execution if an attacker can control the contents of the included files or escalate to full system compromise. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, but it has a high attack complexity, indicating that some conditions or knowledge are needed to exploit it successfully. The CVSS v3.1 score of 8.1 reflects the critical impact on confidentiality, integrity, and availability, as an attacker could read sensitive files, modify application behavior, or cause denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of input used in PHP's include/require statements, allowing attackers to specify unintended file paths. This type of vulnerability is particularly dangerous in web applications as it can lead to full server compromise if exploited effectively.
Potential Impact
For European organizations using thembay Greenmart, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data, including customer information, intellectual property, or internal configuration files. Integrity of the application and data can be compromised, allowing attackers to inject malicious code or alter application logic. Availability may also be affected if attackers cause application crashes or denial of service. Given that Greenmart is an e-commerce or content management related product, disruption or data breaches could result in financial losses, reputational damage, and regulatory penalties under GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the product is widely deployed in European SMEs and enterprises. Organizations relying on Greenmart for online storefronts or digital services must consider this vulnerability a critical threat to their cybersecurity posture.
Mitigation Recommendations
Immediate mitigation should include applying any official patches or updates from thembay once available. In the absence of patches, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent path traversal or injection of arbitrary filenames. Employing web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts can provide temporary protection. Restricting PHP's file inclusion functions via configuration (e.g., disabling allow_url_include and setting open_basedir restrictions) can limit the scope of file inclusion to safe directories. Regularly auditing and reviewing the source code for unsafe dynamic includes is recommended. Additionally, monitoring logs for unusual access patterns or errors related to file inclusion can help detect exploitation attempts early. Organizations should also consider isolating Greenmart instances in segmented network zones to reduce lateral movement if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-49883: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thembay Greenmart
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Greenmart allows PHP Local File Inclusion. This issue affects Greenmart: from n/a through 4.2.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-49883 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the thembay Greenmart product, versions up to and including 4.2.3. The flaw allows for PHP Local File Inclusion (LFI), which means an attacker can manipulate the filename parameter in such a way that arbitrary files on the server can be included and executed within the PHP context. This can lead to remote code execution if an attacker can control the contents of the included files or escalate to full system compromise. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, but it has a high attack complexity, indicating that some conditions or knowledge are needed to exploit it successfully. The CVSS v3.1 score of 8.1 reflects the critical impact on confidentiality, integrity, and availability, as an attacker could read sensitive files, modify application behavior, or cause denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of input used in PHP's include/require statements, allowing attackers to specify unintended file paths. This type of vulnerability is particularly dangerous in web applications as it can lead to full server compromise if exploited effectively.
Potential Impact
For European organizations using thembay Greenmart, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data, including customer information, intellectual property, or internal configuration files. Integrity of the application and data can be compromised, allowing attackers to inject malicious code or alter application logic. Availability may also be affected if attackers cause application crashes or denial of service. Given that Greenmart is an e-commerce or content management related product, disruption or data breaches could result in financial losses, reputational damage, and regulatory penalties under GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the product is widely deployed in European SMEs and enterprises. Organizations relying on Greenmart for online storefronts or digital services must consider this vulnerability a critical threat to their cybersecurity posture.
Mitigation Recommendations
Immediate mitigation should include applying any official patches or updates from thembay once available. In the absence of patches, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent path traversal or injection of arbitrary filenames. Employing web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts can provide temporary protection. Restricting PHP's file inclusion functions via configuration (e.g., disabling allow_url_include and setting open_basedir restrictions) can limit the scope of file inclusion to safe directories. Regularly auditing and reviewing the source code for unsafe dynamic includes is recommended. Additionally, monitoring logs for unusual access patterns or errors related to file inclusion can help detect exploitation attempts early. Organizations should also consider isolating Greenmart instances in segmented network zones to reduce lateral movement if compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-11T16:06:15.666Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 685e88eeca1063fb875de4ed
Added to database: 6/27/2025, 12:05:02 PM
Last enriched: 6/27/2025, 12:30:53 PM
Last updated: 8/15/2025, 6:37:04 PM
Views: 14
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.