Skip to main content

CVE-2025-53334: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in TieLabs Jannah

High
VulnerabilityCVE-2025-53334cvecve-2025-53334cwe-98
Published: Thu Aug 28 2025 (08/28/2025, 12:37:28 UTC)
Source: CVE Database V5
Vendor/Project: TieLabs
Product: Jannah

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in TieLabs Jannah allows PHP Local File Inclusion. This issue affects Jannah: from n/a through 7.4.1.

AI-Powered Analysis

AILast updated: 08/28/2025, 13:21:47 UTC

Technical Analysis

CVE-2025-53334 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the TieLabs Jannah product, versions up to and including 7.4.1. The flaw allows for PHP Remote File Inclusion (RFI), enabling an attacker to include and execute arbitrary files on the server by manipulating the filename parameter used in PHP's include or require statements. This can lead to remote code execution, compromising the confidentiality, integrity, and availability of the affected system. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, although it has a high attack complexity, indicating some conditions must be met for successful exploitation. The CVSS v3.1 base score is 8.1, reflecting the critical impact on confidentiality, integrity, and availability if exploited. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in June 2025 and published in August 2025, indicating it is a recent discovery. The lack of a patch at this time increases the urgency for affected organizations to implement mitigations to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-53334 can be significant, especially for those using the TieLabs Jannah platform, which is a popular PHP-based content management or theme solution. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full system compromise. This can result in data breaches involving sensitive personal data protected under GDPR, disruption of business operations, defacement or manipulation of web content, and potential lateral movement within internal networks. Given the high confidentiality, integrity, and availability impacts, organizations could face regulatory penalties, reputational damage, and financial losses. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, particularly targeting web-facing servers. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands immediate attention to prevent future exploitation.

Mitigation Recommendations

1. Immediate mitigation should include restricting or disabling the use of dynamic include or require statements that accept user input in the affected Jannah versions. 2. Employ web application firewalls (WAFs) with rules specifically designed to detect and block attempts to exploit remote file inclusion vulnerabilities, focusing on suspicious URL parameters or payloads. 3. Implement strict input validation and sanitization on all parameters that influence file inclusion, ensuring only allowed filenames or paths are processed. 4. Use PHP configuration settings such as 'allow_url_include=Off' and 'open_basedir' restrictions to limit file inclusion to trusted directories. 5. Monitor web server logs for unusual requests that may indicate exploitation attempts. 6. Plan and prioritize upgrading to a patched version of Jannah once available or apply vendor-provided patches promptly. 7. Conduct thorough code reviews and security assessments of customizations or plugins that interact with file inclusion mechanisms. 8. Segment and harden web servers hosting Jannah to limit the impact of potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-27T11:59:29.325Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b05380ad5a09ad006cfd3f

Added to database: 8/28/2025, 1:02:56 PM

Last enriched: 8/28/2025, 1:21:47 PM

Last updated: 9/4/2025, 12:34:41 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats