Skip to main content

CVE-2025-58637: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in immonex immonex Kickstart

High
VulnerabilityCVE-2025-58637cvecve-2025-58637cwe-98
Published: Wed Sep 03 2025 (09/03/2025, 14:36:56 UTC)
Source: CVE Database V5
Vendor/Project: immonex
Product: immonex Kickstart

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in immonex immonex Kickstart allows PHP Local File Inclusion. This issue affects immonex Kickstart: from n/a through 1.11.6.

AI-Powered Analysis

AILast updated: 09/03/2025, 15:03:36 UTC

Technical Analysis

CVE-2025-58637 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the immonex Kickstart product up to version 1.11.6. The flaw allows for PHP Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in include or require statements to execute arbitrary local files on the server. This can lead to remote code execution if an attacker can upload malicious files or leverage existing files containing executable PHP code. The vulnerability is exploitable remotely over the network (AV:N) but requires a high attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system, access sensitive data, modify files, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in PHP include/require statements, allowing attackers to traverse directories or specify unintended files. This type of vulnerability is critical in web applications as it can lead to full system compromise if exploited successfully.

Potential Impact

For European organizations using immonex Kickstart, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. The ability to execute arbitrary code on affected servers could allow attackers to pivot within networks, escalate privileges, or deploy ransomware. Availability impacts could disrupt critical business operations, especially for organizations relying on immonex Kickstart for essential services. Given the high confidentiality, integrity, and availability impacts, organizations in sectors such as finance, healthcare, and critical infrastructure are particularly at risk. The requirement for low privileges to exploit means insider threats or compromised low-level accounts could be leveraged. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should immediately audit their use of immonex Kickstart and identify affected versions up to 1.11.6. Until an official patch is released, organizations should implement strict input validation and sanitization on all parameters used in include or require statements to prevent directory traversal or arbitrary file inclusion. Employ web application firewalls (WAFs) with rules targeting LFI attack patterns to detect and block malicious requests. Restrict file permissions on web servers to limit access to sensitive files and disable PHP functions that allow dynamic file inclusion if not required. Conduct thorough code reviews to identify and remediate unsafe include/require usage. Monitor logs for suspicious activity indicative of LFI attempts. Additionally, isolate vulnerable systems within segmented network zones to reduce lateral movement risk. Prepare incident response plans for potential exploitation scenarios. Once patches become available, prioritize immediate deployment and verify remediation through penetration testing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-03T09:03:12.361Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b85517ad5a09ad00f71eba

Added to database: 9/3/2025, 2:47:51 PM

Last enriched: 9/3/2025, 3:03:36 PM

Last updated: 9/3/2025, 6:17:50 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats