Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49935: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in xtemos WoodMart

0
High
VulnerabilityCVE-2025-49935cvecve-2025-49935
Published: Wed Oct 22 2025 (10/22/2025, 14:32:16 UTC)
Source: CVE Database V5
Vendor/Project: xtemos
Product: WoodMart

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in xtemos WoodMart woodmart allows PHP Local File Inclusion.This issue affects WoodMart: from n/a through < 8.3.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:15:24 UTC

Technical Analysis

CVE-2025-49935 is a vulnerability identified in the xtemos WoodMart WordPress theme, affecting all versions prior to 8.3.2. The issue arises from improper validation and control of filenames used in PHP include or require statements, which are critical functions that incorporate external files into PHP scripts. This vulnerability enables Remote File Inclusion (RFI) or Local File Inclusion (LFI), where an attacker can manipulate the filename parameter to include arbitrary files from the local server or remote locations. Exploiting this flaw requires the attacker to have at least low-level privileges (PR:L), but no user interaction is necessary (UI:N), and the attack can be performed remotely over the network (AV:N). The vulnerability impacts confidentiality, integrity, and availability (C:L/I:L/A:L) of the affected systems, as attackers could execute arbitrary code, steal sensitive data, or disrupt service. The scope is considered changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no public exploits are currently known, the vulnerability's characteristics and high CVSS score (7.4) indicate a serious risk. The vulnerability was reserved in June 2025 and published in October 2025, indicating recent discovery. WoodMart is a popular premium WordPress theme used widely for e-commerce and business websites, making this vulnerability relevant for many organizations relying on WordPress ecosystems. The lack of available patches at the time of disclosure suggests urgency in applying updates once released. The vulnerability underscores the importance of secure coding practices around file inclusion and input validation in PHP applications.

Potential Impact

For European organizations, the impact of CVE-2025-49935 can be significant, especially for those operating e-commerce, corporate, or content-heavy websites using the WoodMart theme. Exploitation could lead to unauthorized code execution, enabling attackers to deploy web shells, steal customer data, or manipulate website content. This can result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions. The ability to execute code remotely without user interaction increases the risk of automated attacks and widespread exploitation. Organizations with limited security monitoring or delayed patch management are particularly vulnerable. Additionally, compromised websites can be used as launchpads for further attacks within corporate networks or to distribute malware to visitors. The potential for service disruption also affects business continuity and customer trust. Given the widespread use of WordPress and WoodMart in Europe, the threat could affect a broad range of sectors including retail, finance, and media.

Mitigation Recommendations

1. Immediately update the WoodMart theme to version 8.3.2 or later once patches are available to remediate the vulnerability. 2. Until patches are applied, restrict file inclusion paths by configuring PHP settings such as open_basedir to limit accessible directories. 3. Implement strict input validation and sanitization on any parameters that control file inclusion to prevent manipulation. 4. Deploy Web Application Firewalls (WAFs) with rules targeting suspicious file inclusion attempts and anomalous HTTP requests. 5. Conduct thorough security audits and code reviews of customizations or plugins interacting with WoodMart to identify similar vulnerabilities. 6. Monitor web server logs and intrusion detection systems for unusual access patterns or attempts to exploit file inclusion. 7. Educate development and IT teams about secure coding practices related to file handling in PHP. 8. Consider isolating WordPress instances and limiting permissions to reduce the impact of potential exploitation. 9. Maintain regular backups of website data and configurations to enable rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:07:15.642Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8efec04677bbd7943985a

Added to database: 10/22/2025, 2:53:32 PM

Last enriched: 1/20/2026, 8:15:24 PM

Last updated: 2/5/2026, 3:15:45 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats