Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58900: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes UniTravel

0
High
VulnerabilityCVE-2025-58900cvecve-2025-58900
Published: Thu Dec 18 2025 (12/18/2025, 07:21:54 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: UniTravel

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UniTravel unitravel allows PHP Local File Inclusion.This issue affects UniTravel: from n/a through <= 1.4.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:04:26 UTC

Technical Analysis

CVE-2025-58900 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically affecting the AncoraThemes UniTravel product up to version 1.4.2. The vulnerability allows an attacker to exploit a Local File Inclusion (LFI) flaw by manipulating the filename parameter used in PHP's include or require statements. This improper validation or sanitization enables an attacker to include arbitrary files from the server's filesystem, potentially leading to disclosure of sensitive information, execution of arbitrary PHP code, or full system compromise. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The high attack complexity suggests exploitation might require specific conditions or knowledge, but no authentication or user interaction is needed, increasing the risk. No known exploits are currently reported in the wild, but the vulnerability's nature and impact make it a critical concern for affected deployments. AncoraThemes UniTravel is a PHP-based travel and tourism theme or application, often used by travel agencies and related businesses to manage bookings and display travel information. The vulnerability arises from insecure coding practices in handling dynamic file includes, a common PHP security pitfall. Without proper input validation or sanitization, attackers can traverse directories or inject file paths to include unintended files, such as configuration files, password files, or even web shells if upload functionality is combined. This can lead to remote code execution, data leakage, or denial of service. Since the vulnerability affects versions up to 1.4.2 and no patch links are provided, users must verify their version and seek updates or apply manual mitigations. The vulnerability was reserved in September 2025 and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially those in the travel, tourism, and hospitality sectors using AncoraThemes UniTravel, this vulnerability poses significant risks. Exploitation can lead to unauthorized disclosure of sensitive customer data, including personal and payment information, undermining GDPR compliance and exposing organizations to regulatory penalties. Attackers could execute arbitrary code on web servers, leading to full system compromise, data manipulation, or service disruption, impacting business continuity and reputation. The high severity and network accessibility mean attackers can target vulnerable systems remotely without credentials or user interaction, increasing the threat surface. Given the critical role of travel platforms in customer engagement and booking, any downtime or data breach could result in substantial financial losses and erosion of customer trust. Additionally, compromised servers could be leveraged for further attacks within corporate networks or as part of broader cyber campaigns targeting European infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of remediation, as proof-of-concept exploits may emerge rapidly after disclosure.

Mitigation Recommendations

1. Immediate Version Assessment: Identify all instances of AncoraThemes UniTravel in use and verify their versions. Prioritize upgrading to a patched version once available from the vendor. 2. Input Validation and Sanitization: If patching is not immediately possible, implement strict server-side input validation to restrict include/require parameters to a whitelist of allowed files or paths. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block suspicious requests attempting directory traversal or file inclusion patterns targeting UniTravel endpoints. 4. File System Permissions: Harden file system permissions to ensure the web server user has minimal access rights, preventing inclusion of sensitive files outside the application directory. 5. Disable Dangerous PHP Functions: Where feasible, disable PHP functions like include(), require(), or allow_url_include in the PHP configuration to limit remote file inclusion risks. 6. Monitoring and Logging: Enhance logging of web requests and PHP errors to detect anomalous activity indicative of exploitation attempts. 7. Network Segmentation: Isolate web servers hosting UniTravel from critical internal networks to limit lateral movement if compromise occurs. 8. Incident Response Preparedness: Prepare for potential incidents by having response plans and backups to restore affected systems quickly. 9. Vendor Communication: Engage with AncoraThemes for official patches or guidance and subscribe to security advisories for updates. 10. User Awareness: Educate administrators and developers on secure coding practices to prevent similar vulnerabilities in customizations or future deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:50:39.329Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0414eb3efac366ff3e9

Added to database: 12/18/2025, 7:41:53 AM

Last enriched: 1/20/2026, 9:04:26 PM

Last updated: 2/4/2026, 7:25:47 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats