CVE-2025-58900: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes UniTravel
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UniTravel unitravel allows PHP Local File Inclusion.This issue affects UniTravel: from n/a through <= 1.4.2.
AI Analysis
Technical Summary
CVE-2025-58900 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically affecting the AncoraThemes UniTravel product up to version 1.4.2. The vulnerability allows an attacker to exploit a Local File Inclusion (LFI) flaw by manipulating the filename parameter used in PHP's include or require statements. This improper validation or sanitization enables an attacker to include arbitrary files from the server's filesystem, potentially leading to disclosure of sensitive information, execution of arbitrary PHP code, or full system compromise. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The high attack complexity suggests exploitation might require specific conditions or knowledge, but no authentication or user interaction is needed, increasing the risk. No known exploits are currently reported in the wild, but the vulnerability's nature and impact make it a critical concern for affected deployments. AncoraThemes UniTravel is a PHP-based travel and tourism theme or application, often used by travel agencies and related businesses to manage bookings and display travel information. The vulnerability arises from insecure coding practices in handling dynamic file includes, a common PHP security pitfall. Without proper input validation or sanitization, attackers can traverse directories or inject file paths to include unintended files, such as configuration files, password files, or even web shells if upload functionality is combined. This can lead to remote code execution, data leakage, or denial of service. Since the vulnerability affects versions up to 1.4.2 and no patch links are provided, users must verify their version and seek updates or apply manual mitigations. The vulnerability was reserved in September 2025 and published in December 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, especially those in the travel, tourism, and hospitality sectors using AncoraThemes UniTravel, this vulnerability poses significant risks. Exploitation can lead to unauthorized disclosure of sensitive customer data, including personal and payment information, undermining GDPR compliance and exposing organizations to regulatory penalties. Attackers could execute arbitrary code on web servers, leading to full system compromise, data manipulation, or service disruption, impacting business continuity and reputation. The high severity and network accessibility mean attackers can target vulnerable systems remotely without credentials or user interaction, increasing the threat surface. Given the critical role of travel platforms in customer engagement and booking, any downtime or data breach could result in substantial financial losses and erosion of customer trust. Additionally, compromised servers could be leveraged for further attacks within corporate networks or as part of broader cyber campaigns targeting European infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of remediation, as proof-of-concept exploits may emerge rapidly after disclosure.
Mitigation Recommendations
1. Immediate Version Assessment: Identify all instances of AncoraThemes UniTravel in use and verify their versions. Prioritize upgrading to a patched version once available from the vendor. 2. Input Validation and Sanitization: If patching is not immediately possible, implement strict server-side input validation to restrict include/require parameters to a whitelist of allowed files or paths. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns targeting UniTravel endpoints. 4. File System Permissions: Harden file system permissions to ensure the web server user has minimal access rights, preventing inclusion of sensitive files outside the application directory. 5. Disable Dangerous PHP Functions: Where feasible, disable PHP functions like include(), require(), or allow_url_include in the PHP configuration to limit remote file inclusion risks. 6. Monitoring and Logging: Enhance logging of web requests and PHP errors to detect anomalous activity indicative of exploitation attempts. 7. Network Segmentation: Isolate web servers hosting UniTravel from critical internal networks to limit lateral movement if compromise occurs. 8. Incident Response Preparedness: Prepare for potential incidents by having response plans and backups to restore affected systems quickly. 9. Vendor Communication: Engage with AncoraThemes for official patches or guidance and subscribe to security advisories for updates. 10. User Awareness: Educate administrators and developers on secure coding practices to prevent similar vulnerabilities in customizations or future deployments.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Austria, Switzerland, Sweden
CVE-2025-58900: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes UniTravel
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UniTravel unitravel allows PHP Local File Inclusion.This issue affects UniTravel: from n/a through <= 1.4.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-58900 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically affecting the AncoraThemes UniTravel product up to version 1.4.2. The vulnerability allows an attacker to exploit a Local File Inclusion (LFI) flaw by manipulating the filename parameter used in PHP's include or require statements. This improper validation or sanitization enables an attacker to include arbitrary files from the server's filesystem, potentially leading to disclosure of sensitive information, execution of arbitrary PHP code, or full system compromise. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The high attack complexity suggests exploitation might require specific conditions or knowledge, but no authentication or user interaction is needed, increasing the risk. No known exploits are currently reported in the wild, but the vulnerability's nature and impact make it a critical concern for affected deployments. AncoraThemes UniTravel is a PHP-based travel and tourism theme or application, often used by travel agencies and related businesses to manage bookings and display travel information. The vulnerability arises from insecure coding practices in handling dynamic file includes, a common PHP security pitfall. Without proper input validation or sanitization, attackers can traverse directories or inject file paths to include unintended files, such as configuration files, password files, or even web shells if upload functionality is combined. This can lead to remote code execution, data leakage, or denial of service. Since the vulnerability affects versions up to 1.4.2 and no patch links are provided, users must verify their version and seek updates or apply manual mitigations. The vulnerability was reserved in September 2025 and published in December 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, especially those in the travel, tourism, and hospitality sectors using AncoraThemes UniTravel, this vulnerability poses significant risks. Exploitation can lead to unauthorized disclosure of sensitive customer data, including personal and payment information, undermining GDPR compliance and exposing organizations to regulatory penalties. Attackers could execute arbitrary code on web servers, leading to full system compromise, data manipulation, or service disruption, impacting business continuity and reputation. The high severity and network accessibility mean attackers can target vulnerable systems remotely without credentials or user interaction, increasing the threat surface. Given the critical role of travel platforms in customer engagement and booking, any downtime or data breach could result in substantial financial losses and erosion of customer trust. Additionally, compromised servers could be leveraged for further attacks within corporate networks or as part of broader cyber campaigns targeting European infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of remediation, as proof-of-concept exploits may emerge rapidly after disclosure.
Mitigation Recommendations
1. Immediate Version Assessment: Identify all instances of AncoraThemes UniTravel in use and verify their versions. Prioritize upgrading to a patched version once available from the vendor. 2. Input Validation and Sanitization: If patching is not immediately possible, implement strict server-side input validation to restrict include/require parameters to a whitelist of allowed files or paths. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns targeting UniTravel endpoints. 4. File System Permissions: Harden file system permissions to ensure the web server user has minimal access rights, preventing inclusion of sensitive files outside the application directory. 5. Disable Dangerous PHP Functions: Where feasible, disable PHP functions like include(), require(), or allow_url_include in the PHP configuration to limit remote file inclusion risks. 6. Monitoring and Logging: Enhance logging of web requests and PHP errors to detect anomalous activity indicative of exploitation attempts. 7. Network Segmentation: Isolate web servers hosting UniTravel from critical internal networks to limit lateral movement if compromise occurs. 8. Incident Response Preparedness: Prepare for potential incidents by having response plans and backups to restore affected systems quickly. 9. Vendor Communication: Engage with AncoraThemes for official patches or guidance and subscribe to security advisories for updates. 10. User Awareness: Educate administrators and developers on secure coding practices to prevent similar vulnerabilities in customizations or future deployments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:50:39.329Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0414eb3efac366ff3e9
Added to database: 12/18/2025, 7:41:53 AM
Last enriched: 1/20/2026, 9:04:26 PM
Last updated: 2/4/2026, 7:25:47 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24447: Improper neutralization of formula elements in a CSV file in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-23704: Unrestricted upload of file with dangerous type in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-22875: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-21393: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.