Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58967: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeMove Businext

0
High
VulnerabilityCVE-2025-58967cvecve-2025-58967
Published: Wed Oct 22 2025 (10/22/2025, 14:32:36 UTC)
Source: CVE Database V5
Vendor/Project: ThemeMove
Product: Businext

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Businext businext allows PHP Local File Inclusion.This issue affects Businext: from n/a through < 2.4.4.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:17:00 UTC

Technical Analysis

CVE-2025-58967 is a vulnerability in the ThemeMove Businext WordPress theme, affecting all versions prior to 2.4.4. The issue arises from improper validation and control of filenames used in PHP include or require statements, enabling Remote File Inclusion (RFI). RFI vulnerabilities allow attackers to supply a remote URL as the filename parameter, causing the server to fetch and execute malicious PHP code hosted externally. This can lead to unauthorized code execution, data leakage, and partial compromise of the web server environment. The vulnerability is exploitable remotely over the network without authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 8.2 reflects high impact on confidentiality (complete compromise possible), low impact on integrity (limited modification), and no impact on availability. Although no active exploits are reported, the widespread use of WordPress themes and the common practice of including external files in PHP make this a critical issue to address. The vulnerability was published on October 22, 2025, with Patchstack as the assigner. The lack of official patch links in the provided data suggests that users should verify updates directly from ThemeMove or trusted repositories. Attackers exploiting this flaw could execute arbitrary PHP code, potentially leading to data theft, defacement, or pivoting within the network.

Potential Impact

For European organizations, this vulnerability poses a significant threat to websites running the Businext theme, particularly those hosting sensitive business or customer data. Successful exploitation can lead to unauthorized disclosure of confidential information, such as customer records, financial data, or intellectual property. The integrity of website content may be partially compromised, allowing attackers to inject malicious scripts or alter displayed information. Although availability impact is low, the reputational damage and potential regulatory consequences under GDPR for data breaches are substantial. Organizations relying on WordPress themes for e-commerce, corporate communications, or client portals are especially vulnerable. The ease of remote exploitation without authentication increases the risk of widespread attacks, including automated scanning and exploitation by cybercriminal groups targeting European businesses. Additionally, compromised servers could be leveraged for further attacks, such as phishing campaigns or lateral movement within corporate networks.

Mitigation Recommendations

Immediate mitigation requires updating the Businext theme to version 2.4.4 or later, where the vulnerability is addressed. If updating is not immediately feasible, organizations should implement strict input validation and sanitization on any parameters used in include or require statements within the theme's PHP code. Employing a web application firewall (WAF) configured to detect and block suspicious remote file inclusion attempts can provide an additional layer of defense. Restricting PHP configurations to disable allow_url_include and allow_url_fopen directives reduces the risk of remote file inclusion. Regularly auditing web server logs for unusual requests targeting PHP include parameters can help detect exploitation attempts early. Organizations should also ensure that backups are current and tested to enable rapid recovery in case of compromise. Finally, educating web administrators about the risks of using outdated themes and plugins is critical to maintaining a secure environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:45:10.579Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8eff404677bbd79439a1f

Added to database: 10/22/2025, 2:53:40 PM

Last enriched: 1/20/2026, 9:17:00 PM

Last updated: 2/5/2026, 2:23:11 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats