CVE-2025-53567: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in nK Ghost Kit
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Ghost Kit allows PHP Local File Inclusion. This issue affects Ghost Kit: from n/a through 3.4.1.
AI Analysis
Technical Summary
CVE-2025-53567 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the nK Ghost Kit product up to version 3.4.1. The flaw allows an attacker to perform PHP Local File Inclusion (LFI), which can lead to remote code execution or disclosure of sensitive files on the server. The vulnerability arises because the application does not properly validate or sanitize user-supplied input that determines which files are included or required by the PHP script. An attacker can exploit this by manipulating the filename parameter to include arbitrary files from the local filesystem, potentially executing malicious code or accessing configuration files, credentials, or other sensitive data. The CVSS 3.1 base score of 8.1 reflects a high severity, with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for affected systems. The vulnerability was published on August 20, 2025, and was reserved on July 3, 2025. No patches or mitigations have been linked yet, indicating that affected users should be vigilant and consider temporary protective measures until an official fix is available.
Potential Impact
For European organizations using nK Ghost Kit, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code or disrupt service availability could compromise business operations, especially for organizations relying on Ghost Kit for website or application functionality. Given the high confidentiality, integrity, and availability impacts, attackers could leverage this vulnerability to pivot within networks, escalate privileges, or deploy ransomware. The lack of required authentication and user interaction means that attackers can exploit this remotely and without user involvement, increasing the threat surface. European entities in sectors such as finance, healthcare, government, and critical infrastructure that use Ghost Kit are particularly at risk. Additionally, the vulnerability could be leveraged in supply chain attacks if Ghost Kit is integrated into third-party services or platforms used by European companies.
Mitigation Recommendations
Immediate mitigation steps include restricting access to vulnerable endpoints by implementing web application firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations. Organizations should conduct thorough code reviews and input validation audits to ensure that any filename parameters are strictly validated against a whitelist of allowed files or sanitized to prevent directory traversal and remote inclusion. Disabling PHP functions such as allow_url_include and setting open_basedir restrictions can limit the ability to include remote or unauthorized files. Monitoring logs for unusual file inclusion attempts and anomalous behavior can help detect exploitation attempts early. Until an official patch is released, consider isolating affected systems or running Ghost Kit instances in sandboxed environments to minimize impact. Organizations should maintain up-to-date backups and have incident response plans ready to address potential compromises. Engaging with the vendor for timely patch releases and updates is critical.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-53567: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in nK Ghost Kit
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Ghost Kit allows PHP Local File Inclusion. This issue affects Ghost Kit: from n/a through 3.4.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-53567 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the nK Ghost Kit product up to version 3.4.1. The flaw allows an attacker to perform PHP Local File Inclusion (LFI), which can lead to remote code execution or disclosure of sensitive files on the server. The vulnerability arises because the application does not properly validate or sanitize user-supplied input that determines which files are included or required by the PHP script. An attacker can exploit this by manipulating the filename parameter to include arbitrary files from the local filesystem, potentially executing malicious code or accessing configuration files, credentials, or other sensitive data. The CVSS 3.1 base score of 8.1 reflects a high severity, with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for affected systems. The vulnerability was published on August 20, 2025, and was reserved on July 3, 2025. No patches or mitigations have been linked yet, indicating that affected users should be vigilant and consider temporary protective measures until an official fix is available.
Potential Impact
For European organizations using nK Ghost Kit, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code or disrupt service availability could compromise business operations, especially for organizations relying on Ghost Kit for website or application functionality. Given the high confidentiality, integrity, and availability impacts, attackers could leverage this vulnerability to pivot within networks, escalate privileges, or deploy ransomware. The lack of required authentication and user interaction means that attackers can exploit this remotely and without user involvement, increasing the threat surface. European entities in sectors such as finance, healthcare, government, and critical infrastructure that use Ghost Kit are particularly at risk. Additionally, the vulnerability could be leveraged in supply chain attacks if Ghost Kit is integrated into third-party services or platforms used by European companies.
Mitigation Recommendations
Immediate mitigation steps include restricting access to vulnerable endpoints by implementing web application firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations. Organizations should conduct thorough code reviews and input validation audits to ensure that any filename parameters are strictly validated against a whitelist of allowed files or sanitized to prevent directory traversal and remote inclusion. Disabling PHP functions such as allow_url_include and setting open_basedir restrictions can limit the ability to include remote or unauthorized files. Monitoring logs for unusual file inclusion attempts and anomalous behavior can help detect exploitation attempts early. Until an official patch is released, consider isolating affected systems or running Ghost Kit instances in sandboxed environments to minimize impact. Organizations should maintain up-to-date backups and have incident response plans ready to address potential compromises. Engaging with the vendor for timely patch releases and updates is critical.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-07-03T14:50:56.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a584b8ad5a09ad0002e3c2
Added to database: 8/20/2025, 8:18:00 AM
Last enriched: 8/20/2025, 8:48:58 AM
Last updated: 8/22/2025, 12:34:56 AM
Views: 3
Related Threats
CVE-2025-8193
LowCVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.