Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58892: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Tourimo

0
High
VulnerabilityCVE-2025-58892cvecve-2025-58892
Published: Thu Dec 18 2025 (12/18/2025, 07:21:53 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Tourimo

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Tourimo tourimo allows PHP Local File Inclusion.This issue affects Tourimo: from n/a through <= 1.2.3.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:27:23 UTC

Technical Analysis

CVE-2025-58892 is a Remote File Inclusion (RFI) vulnerability found in AncoraThemes Tourimo versions up to and including 1.2.3. The flaw arises from improper control over the filename parameter used in PHP include or require statements, allowing attackers to specify remote files to be included and executed by the server. This vulnerability enables an unauthenticated attacker to execute arbitrary PHP code remotely, leading to potential data disclosure (confidentiality impact) and unauthorized code execution (integrity impact). The vulnerability does not affect availability directly but can be leveraged for further attacks such as privilege escalation or lateral movement. The CVSS 3.1 score of 8.2 indicates a high severity, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and scope unchanged (S:U). The vulnerability was reserved in early September 2025 and published in December 2025, with no known exploits in the wild yet. Tourimo is a WordPress theme used primarily in the tourism sector, and this vulnerability could be exploited to compromise websites that use this theme without proper patching or mitigation. The lack of official patches or updates at the time of publication necessitates immediate defensive measures.

Potential Impact

For European organizations, especially those in the tourism industry using the Tourimo theme, this vulnerability poses a significant risk of unauthorized remote code execution. Attackers could leverage this flaw to steal sensitive customer data, deface websites, or implant backdoors for persistent access. This could lead to reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Since the vulnerability does not require authentication or user interaction, it can be exploited at scale, increasing the risk of widespread compromise. Organizations relying on AncoraThemes Tourimo for their online presence in Europe’s major tourism markets are particularly vulnerable. The impact extends beyond confidentiality to integrity, as attackers can modify website content or inject malicious scripts affecting end users. Although availability is not directly impacted, secondary effects such as website downtime or blacklisting by search engines may occur. The threat is heightened by the strategic importance of tourism websites in Europe’s economy and the potential for attackers to use compromised sites as launchpads for further attacks.

Mitigation Recommendations

Immediate mitigation steps include: 1) Applying any available patches or updates from AncoraThemes as soon as they are released. 2) If patches are unavailable, disable remote file inclusion in PHP by setting 'allow_url_include=Off' in php.ini and ensuring 'allow_url_fopen' is disabled if not required. 3) Implement strict input validation and sanitization on all parameters that influence file inclusion, using whitelisting approaches to restrict allowed filenames. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities. 5) Conduct thorough code reviews and audits of customizations to the Tourimo theme to identify and remediate unsafe include/require usage. 6) Monitor web server logs for suspicious requests attempting to include remote files. 7) Segment and harden web server environments to limit the impact of potential exploitation. 8) Educate development and security teams about secure coding practices related to file inclusion. These measures combined will reduce the attack surface and protect against exploitation until official patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:50:25.874Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b03f4eb3efac366ff385

Added to database: 12/18/2025, 7:41:51 AM

Last enriched: 1/30/2026, 8:27:23 AM

Last updated: 2/7/2026, 5:47:03 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats