Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49921: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in CrocoBlock JetReviews

0
High
VulnerabilityCVE-2025-49921cvecve-2025-49921
Published: Wed Oct 22 2025 (10/22/2025, 14:32:13 UTC)
Source: CVE Database V5
Vendor/Project: CrocoBlock
Product: JetReviews

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CrocoBlock JetReviews jet-reviews allows PHP Local File Inclusion.This issue affects JetReviews: from n/a through <= 3.0.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:35:22 UTC

Technical Analysis

CVE-2025-49921 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly known as a Remote File Inclusion (RFI) or Local File Inclusion (LFI) vulnerability, found in the CrocoBlock JetReviews plugin for WordPress. This vulnerability affects all versions up to and including 3.0.0. The core issue arises from insufficient validation or sanitization of user-supplied input that controls the filename parameter used in PHP's include or require statements. An attacker can exploit this flaw by crafting a specially designed request that manipulates the filename parameter to include malicious remote or local files. This can lead to arbitrary code execution on the server, unauthorized disclosure of sensitive files, or denial of service by disrupting application availability. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS base score of 7.3 reflects a high severity level, primarily due to the potential for confidentiality, integrity, and availability impacts. Although no public exploits are currently known, the widespread use of JetReviews in WordPress environments makes this a significant threat. The vulnerability was reserved in June 2025 and published in October 2025, with no patch links currently available, indicating that organizations must monitor vendor updates closely. The flaw is particularly dangerous because PHP file inclusion vulnerabilities often lead to full system compromise if exploited successfully. The lack of authentication requirements and ease of exploitation increase the urgency for remediation.

Potential Impact

For European organizations, the impact of CVE-2025-49921 can be severe. Many businesses rely on WordPress and its plugins like JetReviews for customer engagement and e-commerce functionality. Exploitation could allow attackers to execute arbitrary PHP code, potentially leading to full server compromise, data theft, or defacement of websites. Confidential customer data, business-critical information, and intellectual property could be exposed or altered. The integrity of reviews and user-generated content could be undermined, damaging brand reputation and trust. Availability could also be affected if attackers disrupt services or deploy ransomware. Given the remote and unauthenticated nature of the exploit, attackers could target vulnerable sites en masse, increasing the risk of widespread disruption. The threat is especially pertinent for sectors such as retail, finance, and media that heavily use WordPress plugins for customer interaction. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and a breach resulting from this vulnerability could lead to significant legal and financial penalties for European organizations.

Mitigation Recommendations

Organizations should immediately inventory their WordPress environments to identify installations of the JetReviews plugin and verify the versions in use. Until an official patch is released by CrocoBlock, implement the following mitigations: 1) Restrict PHP include paths using open_basedir or disable allow_url_include in PHP configurations to prevent remote file inclusion. 2) Employ web application firewalls (WAFs) with rules targeting suspicious include/require patterns to block exploitation attempts. 3) Harden input validation by implementing strict whitelisting of allowed filenames or parameters controlling file inclusion. 4) Monitor web server and application logs for unusual requests that attempt to manipulate file inclusion parameters. 5) Isolate WordPress instances in segmented network zones to limit lateral movement if compromised. 6) Regularly back up website data and configurations to enable rapid recovery. 7) Stay alert for vendor advisories and apply patches promptly once available. 8) Consider disabling or replacing JetReviews if immediate patching is not feasible. These steps go beyond generic advice by focusing on configuration hardening and proactive detection tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:06:59.983Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8efeb04677bbd794397fa

Added to database: 10/22/2025, 2:53:31 PM

Last enriched: 1/20/2026, 7:35:22 PM

Last updated: 2/7/2026, 5:38:31 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats