CVE-2025-58933: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Anubis
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Anubis anubis allows PHP Local File Inclusion.This issue affects Anubis: from n/a through <= 1.25.
AI Analysis
Technical Summary
CVE-2025-58933 is a Remote File Inclusion (RFI) vulnerability found in the axiomthemes Anubis PHP theme, specifically affecting versions up to 1.25. The vulnerability arises from improper control over the filename used in PHP's include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. This flaw enables remote attackers to execute arbitrary PHP code on the affected system without requiring authentication, although user interaction is necessary to trigger the exploit. The vulnerability impacts confidentiality and integrity by allowing unauthorized code execution, potentially leading to data breaches, website defacement, or further system compromise. The CVSS 3.1 score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, and high impact on confidentiality and integrity but no impact on availability. While no known exploits are currently reported in the wild, the public disclosure and high severity necessitate urgent attention. The vulnerability affects PHP-based web applications using the Anubis theme, commonly deployed in WordPress environments, which are prevalent in many European organizations. The lack of available patches at the time of disclosure increases risk, emphasizing the need for immediate mitigation measures. The vulnerability is tracked by Patchstack and was reserved in early September 2025, with publication in December 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications using the Anubis theme, particularly those running on PHP-based CMS platforms like WordPress. Exploitation can lead to unauthorized remote code execution, compromising sensitive data confidentiality and integrity. Attackers could leverage this to deploy web shells, steal user credentials, manipulate website content, or pivot to internal networks. Given the widespread use of PHP and WordPress in Europe, especially in sectors such as government, finance, and e-commerce, the impact could be severe, including reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The requirement for user interaction slightly reduces the risk but does not eliminate it, as attackers can craft phishing campaigns or malicious links. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score and public disclosure increase the likelihood of future exploitation attempts. Organizations relying on Anubis or similar themes must assess exposure and prioritize remediation to prevent potential breaches.
Mitigation Recommendations
1. Immediately monitor for official patches or updates from axiomthemes and apply them as soon as they become available. 2. Until patches are released, disable PHP's allow_url_include directive to prevent remote file inclusion via URL. 3. Implement strict input validation and sanitization on all user-supplied parameters that influence file inclusion or require/include statements. 4. Employ Web Application Firewalls (WAFs) with rules specifically targeting suspicious file inclusion patterns and block attempts to include remote files. 5. Conduct code reviews and audits of custom themes or plugins to identify and remediate unsafe include/require usage. 6. Restrict file permissions and isolate web application directories to limit the impact of potential code execution. 7. Educate users and administrators about phishing and social engineering risks that could trigger user interaction-based exploits. 8. Monitor logs for anomalous requests involving file inclusion parameters and investigate promptly. 9. Consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts in real time. 10. Maintain regular backups and incident response plans to recover quickly if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-58933: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Anubis
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Anubis anubis allows PHP Local File Inclusion.This issue affects Anubis: from n/a through <= 1.25.
AI-Powered Analysis
Technical Analysis
CVE-2025-58933 is a Remote File Inclusion (RFI) vulnerability found in the axiomthemes Anubis PHP theme, specifically affecting versions up to 1.25. The vulnerability arises from improper control over the filename used in PHP's include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. This flaw enables remote attackers to execute arbitrary PHP code on the affected system without requiring authentication, although user interaction is necessary to trigger the exploit. The vulnerability impacts confidentiality and integrity by allowing unauthorized code execution, potentially leading to data breaches, website defacement, or further system compromise. The CVSS 3.1 score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, and high impact on confidentiality and integrity but no impact on availability. While no known exploits are currently reported in the wild, the public disclosure and high severity necessitate urgent attention. The vulnerability affects PHP-based web applications using the Anubis theme, commonly deployed in WordPress environments, which are prevalent in many European organizations. The lack of available patches at the time of disclosure increases risk, emphasizing the need for immediate mitigation measures. The vulnerability is tracked by Patchstack and was reserved in early September 2025, with publication in December 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications using the Anubis theme, particularly those running on PHP-based CMS platforms like WordPress. Exploitation can lead to unauthorized remote code execution, compromising sensitive data confidentiality and integrity. Attackers could leverage this to deploy web shells, steal user credentials, manipulate website content, or pivot to internal networks. Given the widespread use of PHP and WordPress in Europe, especially in sectors such as government, finance, and e-commerce, the impact could be severe, including reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The requirement for user interaction slightly reduces the risk but does not eliminate it, as attackers can craft phishing campaigns or malicious links. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score and public disclosure increase the likelihood of future exploitation attempts. Organizations relying on Anubis or similar themes must assess exposure and prioritize remediation to prevent potential breaches.
Mitigation Recommendations
1. Immediately monitor for official patches or updates from axiomthemes and apply them as soon as they become available. 2. Until patches are released, disable PHP's allow_url_include directive to prevent remote file inclusion via URL. 3. Implement strict input validation and sanitization on all user-supplied parameters that influence file inclusion or require/include statements. 4. Employ Web Application Firewalls (WAFs) with rules specifically targeting suspicious file inclusion patterns and block attempts to include remote files. 5. Conduct code reviews and audits of custom themes or plugins to identify and remediate unsafe include/require usage. 6. Restrict file permissions and isolate web application directories to limit the impact of potential code execution. 7. Educate users and administrators about phishing and social engineering risks that could trigger user interaction-based exploits. 8. Monitor logs for anomalous requests involving file inclusion parameters and investigate promptly. 9. Consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts in real time. 10. Maintain regular backups and incident response plans to recover quickly if compromise occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-06T04:44:48.014Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0434eb3efac366ff640
Added to database: 12/18/2025, 7:41:55 AM
Last enriched: 1/20/2026, 9:09:16 PM
Last updated: 2/4/2026, 4:45:25 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0662: CWE-426 Untrusted Search Path in Autodesk 3ds Max
HighCVE-2026-0661: CWE-787 Out-of-bounds Write in Autodesk 3ds Max
HighCVE-2026-0660: CWE-121 Stack-based Buffer Overflow in Autodesk 3ds Max
HighCVE-2026-0537: CWE-787 Out-of-bounds Write in Autodesk 3ds Max
HighCVE-2026-20123: URL Redirection to Untrusted Site ('Open Redirect') in Cisco Cisco Evolved Programmable Network Manager (EPNM)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.