Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53435: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Plan My Day

0
High
VulnerabilityCVE-2025-53435cvecve-2025-53435
Published: Thu Dec 18 2025 (12/18/2025, 07:21:46 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Plan My Day

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Plan My Day planmyday allows PHP Local File Inclusion.This issue affects Plan My Day: from n/a through <= 1.1.13.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:44:39 UTC

Technical Analysis

CVE-2025-53435 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly known as a Remote File Inclusion (RFI) flaw, found in the axiomthemes Plan My Day WordPress theme. This vulnerability arises because the theme improperly validates or sanitizes user-supplied input used in PHP include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. The affected versions include all releases up to and including 1.1.13. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:H/PR:N/UI:N). The CVSS score of 8.1 reflects a high severity, with potential impacts on confidentiality, integrity, and availability. Successful exploitation can lead to arbitrary code execution, enabling attackers to execute malicious PHP code, steal sensitive data, modify website content, or disrupt service availability. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a critical concern for websites using this theme. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability was reserved on 2025-06-30 and published on 2025-12-18, indicating recent discovery and disclosure. The improper control of file inclusion is a common and dangerous web application security issue, often exploited to gain full control over vulnerable web servers.

Potential Impact

For European organizations, the impact of CVE-2025-53435 can be severe, especially for those relying on the Plan My Day theme for their WordPress websites. Exploitation could lead to unauthorized remote code execution, resulting in data breaches involving personal or sensitive information, defacement of websites, or complete service outages. This can damage organizational reputation, lead to regulatory non-compliance under GDPR due to data exposure, and cause financial losses from downtime and remediation costs. Given the high adoption of WordPress across Europe, especially in sectors like e-commerce, media, and public services, the risk is amplified. Attackers could leverage this vulnerability to establish persistent backdoors, pivot within networks, or launch further attacks against internal systems. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of automated scanning and attacks. The potential for widespread impact is significant if organizations do not promptly address the vulnerability.

Mitigation Recommendations

1. Immediate monitoring for updates from axiomthemes and applying patches as soon as they are released is critical. 2. Until patches are available, restrict PHP include paths using server configuration (e.g., open_basedir in PHP) to prevent inclusion of remote files. 3. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block suspicious file inclusion attempts targeting the Plan My Day theme. 4. Conduct thorough code reviews and sanitize all user inputs that influence file paths in custom theme modifications. 5. Disable allow_url_include in PHP configurations to prevent remote file inclusion. 6. Implement network-level controls to restrict outbound HTTP/HTTPS requests from web servers to prevent fetching malicious remote files. 7. Regularly scan websites for indicators of compromise and anomalous file changes. 8. Educate web administrators on the risks of RFI vulnerabilities and best practices for secure theme management. 9. Consider isolating WordPress instances in containerized or sandboxed environments to limit potential damage. 10. Maintain up-to-date backups to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-30T10:46:13.038Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b03a4eb3efac366ff23e

Added to database: 12/18/2025, 7:41:46 AM

Last enriched: 1/20/2026, 8:44:39 PM

Last updated: 2/4/2026, 7:43:35 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats