CVE-2025-58637: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in immonex immonex Kickstart
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in immonex immonex Kickstart allows PHP Local File Inclusion. This issue affects immonex Kickstart: from n/a through 1.11.6.
AI Analysis
Technical Summary
CVE-2025-58637 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the immonex Kickstart product up to version 1.11.6. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in include or require statements to execute arbitrary local files on the server. This can lead to remote code execution if an attacker can upload malicious files or leverage existing files containing executable PHP code. The vulnerability is exploitable remotely over the network (AV:N) but requires a high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify files, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in PHP include/require statements, allowing attackers to traverse directories or specify unintended files. This type of vulnerability is critical in web applications as it can lead to full system compromise if exploited successfully.
Potential Impact
For European organizations using immonex Kickstart, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code on affected servers could allow attackers to pivot within networks, escalate privileges, or deploy ransomware. Availability impacts could disrupt critical business operations, especially for organizations relying on immonex Kickstart for essential services. Given the high confidentiality, integrity, and availability impacts, organizations in sectors such as finance, healthcare, and critical infrastructure are particularly at risk. The requirement for low privileges to exploit means insider threats or compromised low-level accounts could be leveraged. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their use of immonex Kickstart and identify affected versions up to 1.11.6. Until an official patch is released, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent directory traversal or arbitrary file inclusion. Employ web application firewalls (WAFs) with rules targeting LFI attack patterns to detect and block malicious requests. Restrict file permissions on web servers to limit access to sensitive files and disable PHP functions that allow dynamic file inclusion if not required. Conduct thorough code reviews to identify and remediate unsafe include/require usage. Monitor logs for suspicious activity indicative of LFI attempts. Additionally, isolate vulnerable systems within segmented network zones to reduce lateral movement risk. Prepare incident response plans for potential exploitation scenarios. Once patches become available, prioritize immediate deployment and verify remediation through penetration testing.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-58637: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in immonex immonex Kickstart
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in immonex immonex Kickstart allows PHP Local File Inclusion. This issue affects immonex Kickstart: from n/a through 1.11.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-58637 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the immonex Kickstart product up to version 1.11.6. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in include or require statements to execute arbitrary local files on the server. This can lead to remote code execution if an attacker can upload malicious files or leverage existing files containing executable PHP code. The vulnerability is exploitable remotely over the network (AV:N) but requires a high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify files, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in PHP include/require statements, allowing attackers to traverse directories or specify unintended files. This type of vulnerability is critical in web applications as it can lead to full system compromise if exploited successfully.
Potential Impact
For European organizations using immonex Kickstart, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code on affected servers could allow attackers to pivot within networks, escalate privileges, or deploy ransomware. Availability impacts could disrupt critical business operations, especially for organizations relying on immonex Kickstart for essential services. Given the high confidentiality, integrity, and availability impacts, organizations in sectors such as finance, healthcare, and critical infrastructure are particularly at risk. The requirement for low privileges to exploit means insider threats or compromised low-level accounts could be leveraged. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their use of immonex Kickstart and identify affected versions up to 1.11.6. Until an official patch is released, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent directory traversal or arbitrary file inclusion. Employ web application firewalls (WAFs) with rules targeting LFI attack patterns to detect and block malicious requests. Restrict file permissions on web servers to limit access to sensitive files and disable PHP functions that allow dynamic file inclusion if not required. Conduct thorough code reviews to identify and remediate unsafe include/require usage. Monitor logs for suspicious activity indicative of LFI attempts. Additionally, isolate vulnerable systems within segmented network zones to reduce lateral movement risk. Prepare incident response plans for potential exploitation scenarios. Once patches become available, prioritize immediate deployment and verify remediation through penetration testing.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-03T09:03:12.361Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b85517ad5a09ad00f71eba
Added to database: 9/3/2025, 2:47:51 PM
Last enriched: 9/3/2025, 3:03:36 PM
Last updated: 10/17/2025, 12:31:26 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-28814: Vulnerability in Hikvision iSecure Center
Critical‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability
HighCVE-2025-11895: CWE-639 Authorization Bypass Through User-Controlled Key in letscms Binary MLM Plan
MediumCVE-2025-55087: CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input in Eclipse Foundation NextX Duo
MediumCVE-2025-55100: CWE-125 Out-of-bounds Read in Eclipse Foundation USBX
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.