CVE-2025-58637: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in immonex immonex Kickstart
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in immonex immonex Kickstart allows PHP Local File Inclusion. This issue affects immonex Kickstart: from n/a through 1.11.6.
AI Analysis
Technical Summary
CVE-2025-58637 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the immonex Kickstart product up to version 1.11.6. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in include or require statements to execute arbitrary local files on the server. This can lead to remote code execution if an attacker can upload malicious files or leverage existing files containing executable PHP code. The vulnerability is exploitable remotely over the network (AV:N) but requires a high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify files, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in PHP include/require statements, allowing attackers to traverse directories or specify unintended files. This type of vulnerability is critical in web applications as it can lead to full system compromise if exploited successfully.
Potential Impact
For European organizations using immonex Kickstart, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code on affected servers could allow attackers to pivot within networks, escalate privileges, or deploy ransomware. Availability impacts could disrupt critical business operations, especially for organizations relying on immonex Kickstart for essential services. Given the high confidentiality, integrity, and availability impacts, organizations in sectors such as finance, healthcare, and critical infrastructure are particularly at risk. The requirement for low privileges to exploit means insider threats or compromised low-level accounts could be leveraged. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their use of immonex Kickstart and identify affected versions up to 1.11.6. Until an official patch is released, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent directory traversal or arbitrary file inclusion. Employ web application firewalls (WAFs) with rules targeting LFI attack patterns to detect and block malicious requests. Restrict file permissions on web servers to limit access to sensitive files and disable PHP functions that allow dynamic file inclusion if not required. Conduct thorough code reviews to identify and remediate unsafe include/require usage. Monitor logs for suspicious activity indicative of LFI attempts. Additionally, isolate vulnerable systems within segmented network zones to reduce lateral movement risk. Prepare incident response plans for potential exploitation scenarios. Once patches become available, prioritize immediate deployment and verify remediation through penetration testing.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-58637: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in immonex immonex Kickstart
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in immonex immonex Kickstart allows PHP Local File Inclusion. This issue affects immonex Kickstart: from n/a through 1.11.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-58637 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the immonex Kickstart product up to version 1.11.6. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in include or require statements to execute arbitrary local files on the server. This can lead to remote code execution if an attacker can upload malicious files or leverage existing files containing executable PHP code. The vulnerability is exploitable remotely over the network (AV:N) but requires a high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify files, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in PHP include/require statements, allowing attackers to traverse directories or specify unintended files. This type of vulnerability is critical in web applications as it can lead to full system compromise if exploited successfully.
Potential Impact
For European organizations using immonex Kickstart, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code on affected servers could allow attackers to pivot within networks, escalate privileges, or deploy ransomware. Availability impacts could disrupt critical business operations, especially for organizations relying on immonex Kickstart for essential services. Given the high confidentiality, integrity, and availability impacts, organizations in sectors such as finance, healthcare, and critical infrastructure are particularly at risk. The requirement for low privileges to exploit means insider threats or compromised low-level accounts could be leveraged. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their use of immonex Kickstart and identify affected versions up to 1.11.6. Until an official patch is released, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent directory traversal or arbitrary file inclusion. Employ web application firewalls (WAFs) with rules targeting LFI attack patterns to detect and block malicious requests. Restrict file permissions on web servers to limit access to sensitive files and disable PHP functions that allow dynamic file inclusion if not required. Conduct thorough code reviews to identify and remediate unsafe include/require usage. Monitor logs for suspicious activity indicative of LFI attempts. Additionally, isolate vulnerable systems within segmented network zones to reduce lateral movement risk. Prepare incident response plans for potential exploitation scenarios. Once patches become available, prioritize immediate deployment and verify remediation through penetration testing.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-03T09:03:12.361Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b85517ad5a09ad00f71eba
Added to database: 9/3/2025, 2:47:51 PM
Last enriched: 9/3/2025, 3:03:36 PM
Last updated: 9/3/2025, 6:17:50 PM
Views: 3
Related Threats
CVE-2025-9928: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9927: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-57833: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in djangoproject Django
HighCVE-2025-55748: CWE-23: Relative Path Traversal in xwiki xwiki-platform
CriticalCVE-2025-55747: CWE-23: Relative Path Traversal in xwiki xwiki-platform
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.