Skip to main content

CVE-2025-54709: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in uxper Sala

High
VulnerabilityCVE-2025-54709cvecve-2025-54709cwe-98
Published: Tue Sep 09 2025 (09/09/2025, 16:25:32 UTC)
Source: CVE Database V5
Vendor/Project: uxper
Product: Sala

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in uxper Sala. This issue affects Sala: from n/a through 1.1.6.

AI-Powered Analysis

AILast updated: 09/09/2025, 18:49:58 UTC

Technical Analysis

CVE-2025-54709 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. This specific vulnerability affects the uxper Sala product, versions up to 1.1.6. The flaw allows an attacker to perform Remote File Inclusion (RFI), a critical security issue where an attacker can manipulate the filename parameter to include remote malicious code. This can lead to arbitrary code execution on the affected server without requiring authentication or user interaction. The CVSS 3.1 base score of 8.1 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, high attack complexity, no privileges required, and no user interaction needed. The vulnerability enables attackers to execute arbitrary PHP code remotely, potentially leading to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using Sala should prioritize monitoring and mitigation efforts.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those using the uxper Sala platform in their web infrastructure. Successful exploitation could lead to unauthorized access to sensitive data, disruption of services, and potential lateral movement within corporate networks. Given the high confidentiality, integrity, and availability impacts, organizations could face data breaches, loss of customer trust, regulatory fines under GDPR, and operational downtime. The remote and unauthenticated nature of the exploit increases the likelihood of automated attacks and widespread exploitation if the vulnerability becomes publicly known or exploited. Industries such as finance, healthcare, and government entities in Europe, which often rely on PHP-based web applications and have strict data protection requirements, would be particularly vulnerable to reputational and compliance damages.

Mitigation Recommendations

Organizations should immediately audit their use of the uxper Sala product and identify any affected versions (up to 1.1.6). In the absence of an official patch, temporary mitigations include disabling or restricting the use of dynamic include/require statements in PHP code, implementing strict input validation and sanitization on any parameters controlling file inclusion, and employing web application firewalls (WAFs) to detect and block suspicious requests attempting remote file inclusion. Network-level controls such as blocking outbound HTTP/HTTPS requests from web servers can limit the ability to fetch remote malicious files. Monitoring logs for unusual file inclusion attempts and anomalous PHP execution patterns is critical. Organizations should also subscribe to vendor advisories and CVE databases for updates on patches or exploit disclosures and plan prompt patch deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-07-28T10:56:17.341Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c076b69256f7c60d152f3b

Added to database: 9/9/2025, 6:49:26 PM

Last enriched: 9/9/2025, 6:49:58 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats