CVE-2025-53565: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in RadiusTheme Widget for Google Reviews
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Widget for Google Reviews allows PHP Local File Inclusion. This issue affects Widget for Google Reviews: from n/a through 1.0.15.
AI Analysis
Technical Summary
CVE-2025-53565 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP programs. This specific vulnerability affects the RadiusTheme Widget for Google Reviews, a PHP-based plugin used to display Google Reviews on websites. The vulnerability allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter in the include or require statement to include unintended files from the local filesystem. This can lead to arbitrary code execution, disclosure of sensitive files, or complete compromise of the web server hosting the vulnerable widget. The vulnerability is present in versions up to 1.0.15 of the widget. The CVSS v3.1 score is 8.1, indicating a high severity with network attack vector, high complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the nature of LFI vulnerabilities makes them attractive targets for attackers, especially if combined with other weaknesses such as file upload flaws or misconfigurations. The lack of available patches at the time of publication increases the urgency for organizations to apply mitigations or workarounds. The vulnerability arises from insufficient validation or sanitization of user-controlled input that determines which files are included by the PHP script, allowing attackers to traverse directories or specify arbitrary file paths.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on the RadiusTheme Widget for Google Reviews on their websites. Exploitation could lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or customer data, severely impacting confidentiality. Attackers could also execute arbitrary PHP code, leading to full system compromise, defacement, or use of the server as a pivot point for further attacks, affecting integrity and availability. Organizations in sectors with high web presence—such as e-commerce, media, and public services—may face reputational damage and regulatory penalties under GDPR if personal data is exposed. The high CVSS score and network accessibility mean attackers can exploit this remotely without authentication or user interaction, increasing the threat surface. The absence of known exploits currently provides a window for proactive defense, but the vulnerability’s characteristics suggest it could be weaponized rapidly once publicized.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately audit their web environments for the presence of the RadiusTheme Widget for Google Reviews, particularly versions up to 1.0.15. If found, temporary mitigations include disabling or removing the widget until a secure update is available. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting directory traversal or unusual include parameters targeting the widget’s endpoints. Implement strict input validation and sanitization on all user-supplied parameters related to file inclusion. Restrict PHP include paths to trusted directories using open_basedir directives and disable allow_url_include in PHP configurations to prevent remote file inclusion. Conduct thorough logging and monitoring for anomalous file access patterns. Additionally, organizations should prepare to apply patches promptly once released and consider isolating affected web servers to limit potential lateral movement. Regular security assessments and penetration testing focusing on file inclusion vulnerabilities are recommended to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-53565: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in RadiusTheme Widget for Google Reviews
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Widget for Google Reviews allows PHP Local File Inclusion. This issue affects Widget for Google Reviews: from n/a through 1.0.15.
AI-Powered Analysis
Technical Analysis
CVE-2025-53565 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP programs. This specific vulnerability affects the RadiusTheme Widget for Google Reviews, a PHP-based plugin used to display Google Reviews on websites. The vulnerability allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter in the include or require statement to include unintended files from the local filesystem. This can lead to arbitrary code execution, disclosure of sensitive files, or complete compromise of the web server hosting the vulnerable widget. The vulnerability is present in versions up to 1.0.15 of the widget. The CVSS v3.1 score is 8.1, indicating a high severity with network attack vector, high complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the nature of LFI vulnerabilities makes them attractive targets for attackers, especially if combined with other weaknesses such as file upload flaws or misconfigurations. The lack of available patches at the time of publication increases the urgency for organizations to apply mitigations or workarounds. The vulnerability arises from insufficient validation or sanitization of user-controlled input that determines which files are included by the PHP script, allowing attackers to traverse directories or specify arbitrary file paths.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on the RadiusTheme Widget for Google Reviews on their websites. Exploitation could lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or customer data, severely impacting confidentiality. Attackers could also execute arbitrary PHP code, leading to full system compromise, defacement, or use of the server as a pivot point for further attacks, affecting integrity and availability. Organizations in sectors with high web presence—such as e-commerce, media, and public services—may face reputational damage and regulatory penalties under GDPR if personal data is exposed. The high CVSS score and network accessibility mean attackers can exploit this remotely without authentication or user interaction, increasing the threat surface. The absence of known exploits currently provides a window for proactive defense, but the vulnerability’s characteristics suggest it could be weaponized rapidly once publicized.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately audit their web environments for the presence of the RadiusTheme Widget for Google Reviews, particularly versions up to 1.0.15. If found, temporary mitigations include disabling or removing the widget until a secure update is available. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting directory traversal or unusual include parameters targeting the widget’s endpoints. Implement strict input validation and sanitization on all user-supplied parameters related to file inclusion. Restrict PHP include paths to trusted directories using open_basedir directives and disable allow_url_include in PHP configurations to prevent remote file inclusion. Conduct thorough logging and monitoring for anomalous file access patterns. Additionally, organizations should prepare to apply patches promptly once released and consider isolating affected web servers to limit potential lateral movement. Regular security assessments and penetration testing focusing on file inclusion vulnerabilities are recommended to detect similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-07-03T14:50:56.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a584b8ad5a09ad0002e3b5
Added to database: 8/20/2025, 8:18:00 AM
Last enriched: 8/20/2025, 8:49:11 AM
Last updated: 8/23/2025, 12:35:19 AM
Views: 2
Related Threats
CVE-2025-9358: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-5352: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lunary-ai lunary-ai/lunary
HighCVE-2025-9357: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin
HighCVE-2025-43764: CWE-1333 Inefficient Regular Expression Complexity in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.