Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58933: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Anubis

0
High
VulnerabilityCVE-2025-58933cvecve-2025-58933
Published: Thu Dec 18 2025 (12/18/2025, 07:21:56 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Anubis

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Anubis anubis allows PHP Local File Inclusion.This issue affects Anubis: from n/a through <= 1.25.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:09:16 UTC

Technical Analysis

CVE-2025-58933 is a Remote File Inclusion (RFI) vulnerability found in the axiomthemes Anubis PHP theme, specifically affecting versions up to 1.25. The vulnerability arises from improper control over the filename used in PHP's include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. This flaw enables remote attackers to execute arbitrary PHP code on the affected system without requiring authentication, although user interaction is necessary to trigger the exploit. The vulnerability impacts confidentiality and integrity by allowing unauthorized code execution, potentially leading to data breaches, website defacement, or further system compromise. The CVSS 3.1 score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, and high impact on confidentiality and integrity but no impact on availability. While no known exploits are currently reported in the wild, the public disclosure and high severity necessitate urgent attention. The vulnerability affects PHP-based web applications using the Anubis theme, commonly deployed in WordPress environments, which are prevalent in many European organizations. The lack of available patches at the time of disclosure increases risk, emphasizing the need for immediate mitigation measures. The vulnerability is tracked by Patchstack and was reserved in early September 2025, with publication in December 2025.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web applications using the Anubis theme, particularly those running on PHP-based CMS platforms like WordPress. Exploitation can lead to unauthorized remote code execution, compromising sensitive data confidentiality and integrity. Attackers could leverage this to deploy web shells, steal user credentials, manipulate website content, or pivot to internal networks. Given the widespread use of PHP and WordPress in Europe, especially in sectors such as government, finance, and e-commerce, the impact could be severe, including reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The requirement for user interaction slightly reduces the risk but does not eliminate it, as attackers can craft phishing campaigns or malicious links. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score and public disclosure increase the likelihood of future exploitation attempts. Organizations relying on Anubis or similar themes must assess exposure and prioritize remediation to prevent potential breaches.

Mitigation Recommendations

1. Immediately monitor for official patches or updates from axiomthemes and apply them as soon as they become available. 2. Until patches are released, disable PHP's allow_url_include directive to prevent remote file inclusion via URL. 3. Implement strict input validation and sanitization on all user-supplied parameters that influence file inclusion or require/include statements. 4. Employ Web Application Firewalls (WAFs) with rules specifically targeting suspicious file inclusion patterns and block attempts to include remote files. 5. Conduct code reviews and audits of custom themes or plugins to identify and remediate unsafe include/require usage. 6. Restrict file permissions and isolate web application directories to limit the impact of potential code execution. 7. Educate users and administrators about phishing and social engineering risks that could trigger user interaction-based exploits. 8. Monitor logs for anomalous requests involving file inclusion parameters and investigate promptly. 9. Consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts in real time. 10. Maintain regular backups and incident response plans to recover quickly if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:44:48.014Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0434eb3efac366ff640

Added to database: 12/18/2025, 7:41:55 AM

Last enriched: 1/20/2026, 9:09:16 PM

Last updated: 2/4/2026, 4:45:25 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats