Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58894: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Good Mood

0
High
VulnerabilityCVE-2025-58894cvecve-2025-58894
Published: Thu Dec 18 2025 (12/18/2025, 07:21:53 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Good Mood

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Good Mood good-mood allows PHP Local File Inclusion.This issue affects Good Mood: from n/a through <= 1.16.

AI-Powered Analysis

AILast updated: 12/18/2025, 09:15:54 UTC

Technical Analysis

CVE-2025-58894 is a Remote File Inclusion vulnerability found in the axiomthemes Good Mood WordPress theme, affecting versions up to 1.16. The root cause is improper validation and control of filenames used in PHP include or require statements, which allows an attacker to manipulate the filename parameter to include arbitrary files. This can lead to Local File Inclusion (LFI) or Remote File Inclusion (RFI), enabling attackers to execute arbitrary PHP code on the server, potentially leading to full site compromise, data theft, or defacement. The vulnerability does not require authentication, increasing its risk profile. While no public exploits have been reported yet, the vulnerability is publicly disclosed and could be targeted by attackers. The theme is used in WordPress environments, which are prevalent globally and in Europe. The lack of a CVSS score indicates the need for an expert severity assessment. The vulnerability affects the confidentiality, integrity, and availability of affected systems, as attackers can execute code remotely and manipulate site content or data. The vulnerability is critical for web servers running the affected theme, especially those exposed to the internet without additional protections.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized remote code execution on web servers running the Good Mood theme, resulting in data breaches, defacement, or use of compromised servers as pivot points for further attacks. Organizations relying on WordPress for their public websites or intranet portals are at risk, particularly those without robust patch management or web application firewalls. The impact includes potential loss of customer trust, regulatory penalties under GDPR due to data exposure, and operational disruptions. Attackers could also leverage compromised servers to launch attacks against other internal or external targets. The vulnerability's ease of exploitation without authentication increases the likelihood of attacks, especially against smaller organizations with limited cybersecurity resources. The reputational damage and remediation costs could be significant, especially for sectors like finance, healthcare, and government institutions in Europe.

Mitigation Recommendations

Organizations should immediately identify if they use the axiomthemes Good Mood theme, particularly versions up to 1.16. Since no official patch links are currently available, administrators should monitor vendor announcements for updates and apply patches promptly once released. In the interim, restrict PHP include paths using configuration directives such as open_basedir to limit file inclusion to trusted directories. Employ web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. Disable remote file inclusion in PHP configurations (allow_url_include=Off) if not already set. Conduct regular code audits and vulnerability scans focusing on PHP file inclusion patterns. Limit user input that controls file paths and sanitize all inputs rigorously. Backup affected systems regularly and prepare incident response plans in case of compromise. Consider isolating or temporarily disabling the affected theme if patching is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:50:39.329Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0414eb3efac366ff3da

Added to database: 12/18/2025, 7:41:53 AM

Last enriched: 12/18/2025, 9:15:54 AM

Last updated: 12/19/2025, 4:04:50 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats