CVE-2025-53328: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Assaf Parag Poll, Survey & Quiz Maker Plugin by Opinion Stage
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Assaf Parag Poll, Survey & Quiz Maker Plugin by Opinion Stage allows PHP Local File Inclusion. This issue affects Poll, Survey & Quiz Maker Plugin by Opinion Stage: from n/a through 19.11.0.
AI Analysis
Technical Summary
CVE-2025-53328 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Poll, Survey & Quiz Maker Plugin by Opinion Stage, developed by Assaf Parag. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter to include arbitrary files on the server. This can lead to the execution of malicious code, disclosure of sensitive information, or complete compromise of the web server hosting the plugin. The vulnerability is present in all versions up to 19.11.0. The CVSS v3.1 score is 7.5, indicating a high severity level, with an attack vector of network (AV:N), requiring high attack complexity (AC:H), no privileges (PR:N), but requiring user interaction (UI:R). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a significant risk if exploited. The vulnerability arises because the plugin does not properly sanitize or validate the input used in PHP include or require statements, allowing attackers to traverse directories or specify local files to be included and executed by the PHP interpreter. This can lead to remote code execution or data leakage depending on the files included.
Potential Impact
For European organizations using the Poll, Survey & Quiz Maker Plugin by Opinion Stage, this vulnerability poses a critical risk. Exploitation could lead to unauthorized disclosure of sensitive data, including user information collected via surveys and polls, which may include personal data protected under GDPR. Additionally, attackers could execute arbitrary code on the affected web servers, potentially leading to full system compromise, defacement, or use of the compromised server as a pivot point for further attacks within the organization's network. The high impact on confidentiality, integrity, and availability means that business operations relying on these plugins could be disrupted, damaging reputation and causing regulatory compliance issues. Given the plugin's usage in customer engagement and data collection, exploitation could also undermine trust and lead to financial losses. The requirement for user interaction (UI:R) suggests that attackers may need to trick users into clicking malicious links or visiting crafted pages, which is feasible in phishing campaigns targeting employees or customers.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the Poll, Survey & Quiz Maker Plugin by Opinion Stage to a patched version once available. In the absence of a patch, organizations should consider temporarily disabling the plugin or restricting access to it via web application firewalls (WAFs) or IP whitelisting to limit exposure. Implement strict input validation and sanitization on any parameters that influence file inclusion to prevent directory traversal or arbitrary file inclusion. Employ security mechanisms such as PHP's open_basedir directive to restrict file access to designated directories. Monitor web server logs for suspicious include requests or unusual file access patterns. Additionally, educate users about phishing risks to reduce the likelihood of successful user interaction exploitation. Regularly audit and scan web applications for vulnerabilities and ensure that plugins and third-party components are kept up to date. Finally, implement robust backup and incident response plans to quickly recover from potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-53328: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Assaf Parag Poll, Survey & Quiz Maker Plugin by Opinion Stage
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Assaf Parag Poll, Survey & Quiz Maker Plugin by Opinion Stage allows PHP Local File Inclusion. This issue affects Poll, Survey & Quiz Maker Plugin by Opinion Stage: from n/a through 19.11.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-53328 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Poll, Survey & Quiz Maker Plugin by Opinion Stage, developed by Assaf Parag. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter to include arbitrary files on the server. This can lead to the execution of malicious code, disclosure of sensitive information, or complete compromise of the web server hosting the plugin. The vulnerability is present in all versions up to 19.11.0. The CVSS v3.1 score is 7.5, indicating a high severity level, with an attack vector of network (AV:N), requiring high attack complexity (AC:H), no privileges (PR:N), but requiring user interaction (UI:R). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a significant risk if exploited. The vulnerability arises because the plugin does not properly sanitize or validate the input used in PHP include or require statements, allowing attackers to traverse directories or specify local files to be included and executed by the PHP interpreter. This can lead to remote code execution or data leakage depending on the files included.
Potential Impact
For European organizations using the Poll, Survey & Quiz Maker Plugin by Opinion Stage, this vulnerability poses a critical risk. Exploitation could lead to unauthorized disclosure of sensitive data, including user information collected via surveys and polls, which may include personal data protected under GDPR. Additionally, attackers could execute arbitrary code on the affected web servers, potentially leading to full system compromise, defacement, or use of the compromised server as a pivot point for further attacks within the organization's network. The high impact on confidentiality, integrity, and availability means that business operations relying on these plugins could be disrupted, damaging reputation and causing regulatory compliance issues. Given the plugin's usage in customer engagement and data collection, exploitation could also undermine trust and lead to financial losses. The requirement for user interaction (UI:R) suggests that attackers may need to trick users into clicking malicious links or visiting crafted pages, which is feasible in phishing campaigns targeting employees or customers.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the Poll, Survey & Quiz Maker Plugin by Opinion Stage to a patched version once available. In the absence of a patch, organizations should consider temporarily disabling the plugin or restricting access to it via web application firewalls (WAFs) or IP whitelisting to limit exposure. Implement strict input validation and sanitization on any parameters that influence file inclusion to prevent directory traversal or arbitrary file inclusion. Employ security mechanisms such as PHP's open_basedir directive to restrict file access to designated directories. Monitor web server logs for suspicious include requests or unusual file access patterns. Additionally, educate users about phishing risks to reduce the likelihood of successful user interaction exploitation. Regularly audit and scan web applications for vulnerabilities and ensure that plugins and third-party components are kept up to date. Finally, implement robust backup and incident response plans to quickly recover from potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-27T11:59:22.191Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b05380ad5a09ad006cfd3c
Added to database: 8/28/2025, 1:02:56 PM
Last enriched: 8/28/2025, 1:21:57 PM
Last updated: 9/2/2025, 12:34:19 AM
Views: 9
Related Threats
CVE-2025-9812: Buffer Overflow in Tenda CH22
HighCVE-2025-9811: SQL Injection in Campcodes Farm Management System
MediumCVE-2025-58421
LowCVE-2025-58420
LowCVE-2025-58419
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.