Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58929: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Pantry

0
High
VulnerabilityCVE-2025-58929cvecve-2025-58929
Published: Thu Dec 18 2025 (12/18/2025, 07:21:55 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Pantry

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Pantry pantry allows PHP Local File Inclusion.This issue affects Pantry: from n/a through <= 1.4.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:42:28 UTC

Technical Analysis

CVE-2025-58929 is a Remote File Inclusion (RFI) vulnerability found in the axiomthemes Pantry PHP application, affecting all versions up to and including 1.4. The vulnerability arises from improper validation and control of filenames used in PHP's include or require statements. This flaw allows an attacker to supply a crafted URL or file path that the application includes and executes, enabling arbitrary code execution on the server. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it highly accessible to attackers. The CVSS 3.1 base score is 8.2, reflecting high impact on confidentiality (full data disclosure possible) and partial impact on integrity (limited code manipulation), with no effect on availability. The vulnerability does not currently have publicly known exploits, but the nature of RFI vulnerabilities historically leads to rapid exploitation once disclosed. The root cause is insufficient sanitization or validation of user-supplied input used in PHP include/require statements, a common security pitfall in PHP web applications. This vulnerability can lead to server compromise, data leakage, and potential pivoting within affected networks. The lack of available patches at the time of disclosure increases the urgency for organizations to implement mitigations. The vulnerability affects Pantry, a product by axiomthemes, which is used in web environments that rely on PHP. Given the widespread use of PHP in European web hosting and CMS platforms, this vulnerability poses a significant risk to affected installations.

Potential Impact

For European organizations, exploitation of CVE-2025-58929 could lead to unauthorized disclosure of sensitive data, including customer information and internal business data, due to the high confidentiality impact. Attackers could execute arbitrary code on vulnerable servers, potentially gaining persistent access and the ability to move laterally within corporate networks. This could result in data breaches, intellectual property theft, and disruption of business operations. Since the vulnerability does not affect availability directly, denial-of-service is less likely, but the integrity of web applications and data could be compromised. Organizations operating e-commerce, content management, or other PHP-based web services using Pantry are particularly at risk. The ease of exploitation without authentication or user interaction increases the threat level, especially for externally facing web applications. The lack of known exploits in the wild currently provides a window for proactive defense, but the risk of imminent exploitation remains high once attackers develop reliable exploit code. European regulatory frameworks such as GDPR impose strict requirements on data protection, so breaches resulting from this vulnerability could lead to significant legal and financial consequences.

Mitigation Recommendations

European organizations should immediately audit their use of the axiomthemes Pantry product and identify affected versions (<= 1.4). In the absence of an official patch, organizations should implement the following mitigations: 1) Disable PHP's allow_url_include directive to prevent remote file inclusion via URL. 2) Implement strict input validation and sanitization on all user-supplied parameters that influence file inclusion, using whitelisting approaches where possible. 3) Restrict PHP include paths to trusted directories only, using open_basedir or similar PHP configuration settings. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious include or require requests. 5) Monitor web server and application logs for unusual requests containing file inclusion patterns or remote URLs. 6) Consider isolating the affected application in a segmented network zone to limit potential lateral movement. 7) Engage with axiomthemes for updates or patches and plan for timely application once available. 8) Conduct security awareness training for developers and administrators on secure coding practices related to file inclusion. These steps go beyond generic advice by focusing on configuration hardening, monitoring, and network segmentation tailored to this specific vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:44:31.842Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0434eb3efac366ff634

Added to database: 12/18/2025, 7:41:55 AM

Last enriched: 1/28/2026, 7:42:28 PM

Last updated: 2/4/2026, 10:02:06 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats