Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52768: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Faith & Hope

0
High
VulnerabilityCVE-2025-52768cvecve-2025-52768
Published: Thu Dec 18 2025 (12/18/2025, 07:21:45 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Faith & Hope

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Faith & Hope faith-hope allows PHP Local File Inclusion.This issue affects Faith & Hope: from n/a through <= 2.13.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:31:59 UTC

Technical Analysis

CVE-2025-52768 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly referred to as a Remote File Inclusion (RFI) vulnerability, found in the AncoraThemes Faith & Hope WordPress theme versions up to 2.13.0. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in PHP include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. This can lead to arbitrary code execution, enabling attackers to run malicious scripts remotely, potentially taking full control over the affected web server. The CVSS v3.1 base score is 8.1, indicating a high severity with network attack vector, high complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers. Although no known exploits are currently reported in the wild, the nature of RFI vulnerabilities historically makes them attractive targets for attackers seeking to compromise web servers, deploy malware, or pivot into internal networks. The affected product, AncoraThemes Faith & Hope, is a WordPress theme used primarily for blogs, portfolios, and business websites, which may be deployed in various organizational contexts. The lack of available patches or updates at the time of publication necessitates immediate mitigation efforts by administrators. The vulnerability was reserved in June 2025 and published in December 2025, indicating recent discovery and disclosure. The absence of CWE identifiers limits direct mapping to common weakness enumerations but the nature of the flaw aligns with CWE-98 (Improper Control of Filename for Include/Require Statement).

Potential Impact

For European organizations, the impact of CVE-2025-52768 can be severe, particularly for those relying on WordPress sites using the AncoraThemes Faith & Hope theme. Successful exploitation can lead to complete system compromise, including unauthorized access to sensitive data, defacement of websites, deployment of ransomware or other malware, and disruption of services. Confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity loss could undermine trust in the organization's digital presence, while availability impacts could disrupt business operations, especially for e-commerce or customer-facing portals. Given the network-exploitable nature and lack of required privileges, attackers can target vulnerable sites en masse, increasing the risk of widespread compromise. The absence of known exploits in the wild currently provides a window for proactive defense, but the high severity score indicates that exploitation would have critical consequences. Organizations in sectors such as finance, healthcare, media, and government, which often use WordPress for public-facing content, are particularly at risk. Additionally, supply chain risks exist if third-party service providers use the vulnerable theme, potentially impacting European clients indirectly.

Mitigation Recommendations

1. Immediate removal or disabling of the AncoraThemes Faith & Hope theme version 2.13.0 or earlier from all WordPress installations until a secure patch is available. 2. Monitor official AncoraThemes channels and Patchstack advisories for release of a security update and apply patches promptly. 3. Implement strict input validation and sanitization on all user inputs, especially those influencing file inclusion or path parameters. 4. Employ Web Application Firewalls (WAFs) with rules designed to detect and block attempts to exploit RFI vulnerabilities, including suspicious URL patterns and remote file inclusion attempts. 5. Conduct thorough code reviews and security audits of custom themes and plugins to identify similar vulnerabilities. 6. Restrict PHP configuration settings such as disabling allow_url_include and allow_url_fopen to prevent remote file inclusion. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Monitor web server logs for unusual requests indicative of exploitation attempts. 9. Educate website administrators and developers about secure coding practices and the risks of insecure file inclusion. 10. Consider migrating to alternative, actively maintained themes with strong security track records if timely patches are unavailable.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:03:09.015Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0394eb3efac366ff214

Added to database: 12/18/2025, 7:41:45 AM

Last enriched: 1/20/2026, 8:31:59 PM

Last updated: 2/5/2026, 4:15:13 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats