CVE-2025-58994: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in designervily Greenify
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in designervily Greenify greenify allows PHP Local File Inclusion.This issue affects Greenify: from n/a through <= 2.2.
AI Analysis
Technical Summary
CVE-2025-58994 is a Remote File Inclusion (RFI) vulnerability found in the designervily Greenify PHP application, affecting versions up to 2.2. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, which allows an attacker to specify a remote file to be included and executed by the server. This occurs because the application fails to properly validate or sanitize user-supplied input controlling the file path, enabling remote attackers to execute arbitrary PHP code on the server. The vulnerability has a CVSS 3.1 base score of 8.1, indicating high severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). Exploitation could lead to unauthorized disclosure of sensitive data, code execution, and potential further compromise of the affected system. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the ease of exploitation and the critical impact on system security. The vulnerability was reserved in September 2025 and published in November 2025. No official patches or mitigation links are currently provided, indicating the need for immediate defensive measures by users of Greenify.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications running Greenify, especially those relying on PHP environments. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to access sensitive data, manipulate application logic, or establish persistent footholds within networks. This can result in data breaches, intellectual property theft, and disruption of business operations. Given the high confidentiality and integrity impact, organizations handling personal data under GDPR face potential regulatory and reputational consequences. The requirement for user interaction (e.g., visiting a malicious link) means phishing or social engineering could facilitate exploitation. The lack of availability impact reduces the risk of denial-of-service but does not diminish the criticality of data compromise. Organizations with public-facing Greenify deployments are particularly vulnerable, increasing the attack surface for threat actors targeting European entities.
Mitigation Recommendations
1. Immediately audit all Greenify installations and identify affected versions (<= 2.2). 2. Monitor for official patches or updates from designervily and apply them promptly once available. 3. Until patches are released, implement strict input validation and sanitization on all parameters controlling file inclusion to prevent remote file paths. 4. Disable PHP's allow_url_include directive in php.ini to prevent inclusion of remote files. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. 6. Conduct security awareness training to reduce the risk of user interaction with malicious links. 7. Review server and application logs for signs of exploitation attempts. 8. Consider isolating or restricting Greenify deployments to minimize exposure. 9. Use runtime application self-protection (RASP) tools to detect and block exploitation in real-time. 10. Regularly back up critical data and test incident response plans to prepare for potential breaches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-58994: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in designervily Greenify
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in designervily Greenify greenify allows PHP Local File Inclusion.This issue affects Greenify: from n/a through <= 2.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-58994 is a Remote File Inclusion (RFI) vulnerability found in the designervily Greenify PHP application, affecting versions up to 2.2. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, which allows an attacker to specify a remote file to be included and executed by the server. This occurs because the application fails to properly validate or sanitize user-supplied input controlling the file path, enabling remote attackers to execute arbitrary PHP code on the server. The vulnerability has a CVSS 3.1 base score of 8.1, indicating high severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). Exploitation could lead to unauthorized disclosure of sensitive data, code execution, and potential further compromise of the affected system. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the ease of exploitation and the critical impact on system security. The vulnerability was reserved in September 2025 and published in November 2025. No official patches or mitigation links are currently provided, indicating the need for immediate defensive measures by users of Greenify.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications running Greenify, especially those relying on PHP environments. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to access sensitive data, manipulate application logic, or establish persistent footholds within networks. This can result in data breaches, intellectual property theft, and disruption of business operations. Given the high confidentiality and integrity impact, organizations handling personal data under GDPR face potential regulatory and reputational consequences. The requirement for user interaction (e.g., visiting a malicious link) means phishing or social engineering could facilitate exploitation. The lack of availability impact reduces the risk of denial-of-service but does not diminish the criticality of data compromise. Organizations with public-facing Greenify deployments are particularly vulnerable, increasing the attack surface for threat actors targeting European entities.
Mitigation Recommendations
1. Immediately audit all Greenify installations and identify affected versions (<= 2.2). 2. Monitor for official patches or updates from designervily and apply them promptly once available. 3. Until patches are released, implement strict input validation and sanitization on all parameters controlling file inclusion to prevent remote file paths. 4. Disable PHP's allow_url_include directive in php.ini to prevent inclusion of remote files. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. 6. Conduct security awareness training to reduce the risk of user interaction with malicious links. 7. Review server and application logs for signs of exploitation attempts. 8. Consider isolating or restricting Greenify deployments to minimize exposure. 9. Use runtime application self-protection (RASP) tools to detect and block exploitation in real-time. 10. Regularly back up critical data and test incident response plans to prepare for potential breaches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-06T04:45:29.150Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690cc7f7ca26fb4dd2f590b7
Added to database: 11/6/2025, 4:08:23 PM
Last enriched: 1/20/2026, 9:18:33 PM
Last updated: 2/6/2026, 2:01:59 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.