CVE-2025-53198: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in favethemes Houzez
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in favethemes Houzez allows PHP Local File Inclusion. This issue affects Houzez: from n/a through 4.0.4.
AI Analysis
Technical Summary
CVE-2025-53198 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the 'Houzez' product developed by favethemes, up to version 4.0.4. The flaw allows for PHP Local File Inclusion (LFI), a type of vulnerability where an attacker can manipulate the filename parameter in include or require statements to execute arbitrary files on the server. Although the description mentions 'PHP Remote File Inclusion,' the actual impact is local file inclusion, which can still lead to severe consequences such as arbitrary code execution, information disclosure, and full system compromise if exploited successfully. The CVSS v3.1 base score is 8.1, indicating a high severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). The vulnerability does not require authentication or user interaction but does require a complex attack vector, which may limit exploitation ease. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting the vulnerability is newly disclosed or reserved. The vulnerability arises because the application does not properly sanitize or validate input controlling the filename in include/require statements, enabling attackers to include unintended files from the local filesystem, potentially leading to arbitrary code execution or data leakage.
Potential Impact
For European organizations using the Houzez theme, particularly real estate agencies and property management companies that rely on this product for their web presence, this vulnerability poses a significant risk. Successful exploitation could lead to full compromise of web servers, allowing attackers to access sensitive client data, internal documents, or credentials stored on the server. This could result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could use compromised servers as pivot points for lateral movement within corporate networks or to launch further attacks such as ransomware. The high impact on confidentiality, integrity, and availability means that critical business operations could be disrupted. Since the vulnerability is exploitable remotely without authentication, attackers can target vulnerable servers directly over the internet, increasing the threat surface. The lack of patches at present means organizations must act quickly to implement mitigations to reduce exposure.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to vulnerable endpoints by implementing web application firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations. 2. Disable or restrict PHP functions that allow file inclusion where possible, such as 'include', 'require', 'include_once', and 'require_once', or use PHP configuration directives like 'open_basedir' to limit accessible directories. 3. Employ strict input validation and sanitization on all user-supplied inputs that influence file paths, ensuring only expected filenames or whitelisted values are accepted. 4. Monitor web server logs for unusual requests attempting to exploit file inclusion, such as requests containing directory traversal sequences or suspicious file extensions. 5. Segregate web servers from critical internal networks to limit lateral movement if compromise occurs. 6. Regularly back up website data and configurations to enable rapid recovery. 7. Stay updated with favethemes announcements for official patches or updates addressing this vulnerability and apply them promptly once available. 8. Conduct security audits and penetration testing focused on file inclusion vulnerabilities to identify and remediate similar issues proactively.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-53198: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in favethemes Houzez
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in favethemes Houzez allows PHP Local File Inclusion. This issue affects Houzez: from n/a through 4.0.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-53198 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the 'Houzez' product developed by favethemes, up to version 4.0.4. The flaw allows for PHP Local File Inclusion (LFI), a type of vulnerability where an attacker can manipulate the filename parameter in include or require statements to execute arbitrary files on the server. Although the description mentions 'PHP Remote File Inclusion,' the actual impact is local file inclusion, which can still lead to severe consequences such as arbitrary code execution, information disclosure, and full system compromise if exploited successfully. The CVSS v3.1 base score is 8.1, indicating a high severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). The vulnerability does not require authentication or user interaction but does require a complex attack vector, which may limit exploitation ease. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting the vulnerability is newly disclosed or reserved. The vulnerability arises because the application does not properly sanitize or validate input controlling the filename in include/require statements, enabling attackers to include unintended files from the local filesystem, potentially leading to arbitrary code execution or data leakage.
Potential Impact
For European organizations using the Houzez theme, particularly real estate agencies and property management companies that rely on this product for their web presence, this vulnerability poses a significant risk. Successful exploitation could lead to full compromise of web servers, allowing attackers to access sensitive client data, internal documents, or credentials stored on the server. This could result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could use compromised servers as pivot points for lateral movement within corporate networks or to launch further attacks such as ransomware. The high impact on confidentiality, integrity, and availability means that critical business operations could be disrupted. Since the vulnerability is exploitable remotely without authentication, attackers can target vulnerable servers directly over the internet, increasing the threat surface. The lack of patches at present means organizations must act quickly to implement mitigations to reduce exposure.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to vulnerable endpoints by implementing web application firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations. 2. Disable or restrict PHP functions that allow file inclusion where possible, such as 'include', 'require', 'include_once', and 'require_once', or use PHP configuration directives like 'open_basedir' to limit accessible directories. 3. Employ strict input validation and sanitization on all user-supplied inputs that influence file paths, ensuring only expected filenames or whitelisted values are accepted. 4. Monitor web server logs for unusual requests attempting to exploit file inclusion, such as requests containing directory traversal sequences or suspicious file extensions. 5. Segregate web servers from critical internal networks to limit lateral movement if compromise occurs. 6. Regularly back up website data and configurations to enable rapid recovery. 7. Stay updated with favethemes announcements for official patches or updates addressing this vulnerability and apply them promptly once available. 8. Conduct security audits and penetration testing focused on file inclusion vulnerabilities to identify and remediate similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-27T10:27:33.251Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a584b7ad5a09ad0002e375
Added to database: 8/20/2025, 8:17:59 AM
Last enriched: 8/20/2025, 9:07:09 AM
Last updated: 9/4/2025, 11:45:36 PM
Views: 3
Related Threats
CVE-2025-58362: CWE-706: Use of Incorrectly-Resolved Name or Reference in honojs hono
HighCVE-2025-58179: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro
HighCVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
MediumCVE-2025-58352: CWE-613: Insufficient Session Expiration in WeblateOrg weblate
LowCVE-2025-55244: CWE-284: Improper Access Control in Microsoft Azure Bot Service
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.