Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58942: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Dwell

0
High
VulnerabilityCVE-2025-58942cvecve-2025-58942
Published: Thu Dec 18 2025 (12/18/2025, 07:21:58 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Dwell

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Dwell dwell allows PHP Local File Inclusion.This issue affects Dwell: from n/a through <= 1.7.0.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:44:16 UTC

Technical Analysis

CVE-2025-58942 is a remote file inclusion (RFI) vulnerability found in the axiomthemes Dwell WordPress theme, specifically affecting versions up to 1.7.0. The root cause is improper validation and control of filenames used in PHP include or require statements, which allows an attacker to specify a remote file URL that the server will include and execute. This vulnerability is exploitable remotely without authentication or user interaction, making it highly accessible to attackers. Successful exploitation can lead to execution of arbitrary PHP code on the web server, potentially allowing attackers to steal sensitive data, modify site content, or establish persistent backdoors. The CVSS v3.1 score of 8.2 reflects the high impact on confidentiality and moderate impact on integrity, with no impact on availability. The vulnerability is categorized under improper control of file inclusion, a common and dangerous web application flaw. Although no public exploits have been reported yet, the ease of exploitation and severity make it a critical risk for affected sites. The vulnerability affects the PHP codebase of the Dwell theme, widely used in WordPress installations for building websites, which increases the attack surface significantly. Organizations running this theme should prioritize patching or apply mitigations to prevent remote code execution attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of data hosted on websites using the Dwell theme, including customer information, internal documents, and authentication credentials. Attackers could leverage this flaw to execute arbitrary code, leading to website defacement, data theft, or pivoting into internal networks. The integrity of website content and backend systems may be compromised, undermining trust and potentially causing reputational damage. Although availability is not directly impacted, secondary effects such as cleanup or mitigation downtime could disrupt services. Organizations in sectors with strict data protection regulations like GDPR face additional compliance risks and potential fines if breaches occur. Public-facing websites of government, financial, healthcare, and e-commerce entities in Europe are particularly attractive targets due to the sensitive nature of their data and services. The vulnerability's remote and unauthenticated nature increases the likelihood of automated scanning and exploitation attempts, necessitating urgent attention.

Mitigation Recommendations

1. Immediately update the Dwell theme to a patched version once released by axiomthemes. Monitor vendor announcements for official patches. 2. If patches are not yet available, disable or remove the Dwell theme from production environments to eliminate exposure. 3. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious include/require requests or remote file inclusion patterns targeting the theme. 4. Restrict outbound HTTP/HTTPS requests from the web server to prevent fetching remote files, using network-level controls or PHP configuration (e.g., disable allow_url_include and allow_url_fopen). 5. Conduct thorough code reviews and audits of custom PHP code to ensure no other file inclusion vulnerabilities exist. 6. Employ runtime application self-protection (RASP) tools to detect and block exploitation attempts in real time. 7. Monitor web server logs for unusual requests or errors related to file inclusion. 8. Educate development and security teams about secure coding practices to prevent similar vulnerabilities. 9. Regularly back up website data and configurations to enable rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:44:48.016Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0454eb3efac366ff8e7

Added to database: 12/18/2025, 7:41:57 AM

Last enriched: 1/28/2026, 7:44:16 PM

Last updated: 2/4/2026, 5:27:15 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats