CVE-2025-58894: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Good Mood
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Good Mood good-mood allows PHP Local File Inclusion.This issue affects Good Mood: from n/a through <= 1.16.
AI Analysis
Technical Summary
CVE-2025-58894 is a Remote File Inclusion vulnerability found in the axiomthemes Good Mood WordPress theme, affecting versions up to 1.16. The root cause is improper validation and control of filenames used in PHP include or require statements, which allows an attacker to manipulate the filename parameter to include arbitrary files. This can lead to Local File Inclusion (LFI) or Remote File Inclusion (RFI), enabling attackers to execute arbitrary PHP code on the server, potentially leading to full site compromise, data theft, or defacement. The vulnerability does not require authentication, increasing its risk profile. While no public exploits have been reported yet, the vulnerability is publicly disclosed and could be targeted by attackers. The theme is used in WordPress environments, which are prevalent globally and in Europe. The lack of a CVSS score indicates the need for an expert severity assessment. The vulnerability affects the confidentiality, integrity, and availability of affected systems, as attackers can execute code remotely and manipulate site content or data. The vulnerability is critical for web servers running the affected theme, especially those exposed to the internet without additional protections.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized remote code execution on web servers running the Good Mood theme, resulting in data breaches, defacement, or use of compromised servers as pivot points for further attacks. Organizations relying on WordPress for their public websites or intranet portals are at risk, particularly those without robust patch management or web application firewalls. The impact includes potential loss of customer trust, regulatory penalties under GDPR due to data exposure, and operational disruptions. Attackers could also leverage compromised servers to launch attacks against other internal or external targets. The vulnerability's ease of exploitation without authentication increases the likelihood of attacks, especially against smaller organizations with limited cybersecurity resources. The reputational damage and remediation costs could be significant, especially for sectors like finance, healthcare, and government institutions in Europe.
Mitigation Recommendations
Organizations should immediately identify if they use the axiomthemes Good Mood theme, particularly versions up to 1.16. Since no official patch links are currently available, administrators should monitor vendor announcements for updates and apply patches promptly once released. In the interim, restrict PHP include paths using configuration directives such as open_basedir to limit file inclusion to trusted directories. Employ web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. Disable remote file inclusion in PHP configurations (allow_url_include=Off) if not already set. Conduct regular code audits and vulnerability scans focusing on PHP file inclusion patterns. Limit user input that controls file paths and sanitize all inputs rigorously. Backup affected systems regularly and prepare incident response plans in case of compromise. Consider isolating or temporarily disabling the affected theme if patching is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-58894: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Good Mood
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Good Mood good-mood allows PHP Local File Inclusion.This issue affects Good Mood: from n/a through <= 1.16.
AI-Powered Analysis
Technical Analysis
CVE-2025-58894 is a Remote File Inclusion vulnerability found in the axiomthemes Good Mood WordPress theme, affecting versions up to 1.16. The root cause is improper validation and control of filenames used in PHP include or require statements, which allows an attacker to manipulate the filename parameter to include arbitrary files. This can lead to Local File Inclusion (LFI) or Remote File Inclusion (RFI), enabling attackers to execute arbitrary PHP code on the server, potentially leading to full site compromise, data theft, or defacement. The vulnerability does not require authentication, increasing its risk profile. While no public exploits have been reported yet, the vulnerability is publicly disclosed and could be targeted by attackers. The theme is used in WordPress environments, which are prevalent globally and in Europe. The lack of a CVSS score indicates the need for an expert severity assessment. The vulnerability affects the confidentiality, integrity, and availability of affected systems, as attackers can execute code remotely and manipulate site content or data. The vulnerability is critical for web servers running the affected theme, especially those exposed to the internet without additional protections.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized remote code execution on web servers running the Good Mood theme, resulting in data breaches, defacement, or use of compromised servers as pivot points for further attacks. Organizations relying on WordPress for their public websites or intranet portals are at risk, particularly those without robust patch management or web application firewalls. The impact includes potential loss of customer trust, regulatory penalties under GDPR due to data exposure, and operational disruptions. Attackers could also leverage compromised servers to launch attacks against other internal or external targets. The vulnerability's ease of exploitation without authentication increases the likelihood of attacks, especially against smaller organizations with limited cybersecurity resources. The reputational damage and remediation costs could be significant, especially for sectors like finance, healthcare, and government institutions in Europe.
Mitigation Recommendations
Organizations should immediately identify if they use the axiomthemes Good Mood theme, particularly versions up to 1.16. Since no official patch links are currently available, administrators should monitor vendor announcements for updates and apply patches promptly once released. In the interim, restrict PHP include paths using configuration directives such as open_basedir to limit file inclusion to trusted directories. Employ web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. Disable remote file inclusion in PHP configurations (allow_url_include=Off) if not already set. Conduct regular code audits and vulnerability scans focusing on PHP file inclusion patterns. Limit user input that controls file paths and sanitize all inputs rigorously. Backup affected systems regularly and prepare incident response plans in case of compromise. Consider isolating or temporarily disabling the affected theme if patching is delayed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:50:39.329Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0414eb3efac366ff3da
Added to database: 12/18/2025, 7:41:53 AM
Last enriched: 12/18/2025, 9:15:54 AM
Last updated: 12/19/2025, 4:04:50 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67846: CWE-472 External Control of Assumed-Immutable Web Parameter in Mintlify Mintlify Platform
MediumCVE-2025-67845: CWE-24 Path Traversal: '../filedir' in Mintlify Mintlify Platform
MediumCVE-2025-67844: CWE-425 Direct Request ('Forced Browsing') in Mintlify Mintlify Platform
MediumCVE-2025-67843: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in Mintlify Mintlify Platform
HighCVE-2025-67842: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Mintlify Mintlify Platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.