Skip to main content

CVE-2025-53198: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in favethemes Houzez

High
VulnerabilityCVE-2025-53198cvecve-2025-53198cwe-98
Published: Wed Aug 20 2025 (08/20/2025, 08:03:21 UTC)
Source: CVE Database V5
Vendor/Project: favethemes
Product: Houzez

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in favethemes Houzez allows PHP Local File Inclusion. This issue affects Houzez: from n/a through 4.0.4.

AI-Powered Analysis

AILast updated: 08/20/2025, 09:07:09 UTC

Technical Analysis

CVE-2025-53198 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the 'Houzez' product developed by favethemes, up to version 4.0.4. The flaw allows for PHP Local File Inclusion (LFI), a type of vulnerability where an attacker can manipulate the filename parameter in include or require statements to execute arbitrary files on the server. Although the description mentions 'PHP Remote File Inclusion,' the actual impact is local file inclusion, which can still lead to severe consequences such as arbitrary code execution, information disclosure, and full system compromise if exploited successfully. The CVSS v3.1 base score is 8.1, indicating a high severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). The vulnerability does not require authentication or user interaction but does require a complex attack vector, which may limit exploitation ease. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting the vulnerability is newly disclosed or reserved. The vulnerability arises because the application does not properly sanitize or validate input controlling the filename in include/require statements, enabling attackers to include unintended files from the local filesystem, potentially leading to arbitrary code execution or data leakage.

Potential Impact

For European organizations using the Houzez theme, particularly real estate agencies and property management companies that rely on this product for their web presence, this vulnerability poses a significant risk. Successful exploitation could lead to full compromise of web servers, allowing attackers to access sensitive client data, internal documents, or credentials stored on the server. This could result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could use compromised servers as pivot points for lateral movement within corporate networks or to launch further attacks such as ransomware. The high impact on confidentiality, integrity, and availability means that critical business operations could be disrupted. Since the vulnerability is exploitable remotely without authentication, attackers can target vulnerable servers directly over the internet, increasing the threat surface. The lack of patches at present means organizations must act quickly to implement mitigations to reduce exposure.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to vulnerable endpoints by implementing web application firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations. 2. Disable or restrict PHP functions that allow file inclusion where possible, such as 'include', 'require', 'include_once', and 'require_once', or use PHP configuration directives like 'open_basedir' to limit accessible directories. 3. Employ strict input validation and sanitization on all user-supplied inputs that influence file paths, ensuring only expected filenames or whitelisted values are accepted. 4. Monitor web server logs for unusual requests attempting to exploit file inclusion, such as requests containing directory traversal sequences or suspicious file extensions. 5. Segregate web servers from critical internal networks to limit lateral movement if compromise occurs. 6. Regularly back up website data and configurations to enable rapid recovery. 7. Stay updated with favethemes announcements for official patches or updates addressing this vulnerability and apply them promptly once available. 8. Conduct security audits and penetration testing focused on file inclusion vulnerabilities to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-27T10:27:33.251Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a584b7ad5a09ad0002e375

Added to database: 8/20/2025, 8:17:59 AM

Last enriched: 8/20/2025, 9:07:09 AM

Last updated: 9/4/2025, 11:45:36 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats