Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60046: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes HeartStar

0
High
VulnerabilityCVE-2025-60046cvecve-2025-60046
Published: Thu Dec 18 2025 (12/18/2025, 07:22:00 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: HeartStar

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes HeartStar heartstar allows PHP Local File Inclusion.This issue affects HeartStar: from n/a through <= 1.0.14.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:29:04 UTC

Technical Analysis

CVE-2025-60046 is a Remote File Inclusion (RFI) vulnerability found in the HeartStar theme developed by axiomthemes for PHP-based web applications. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. This can lead to remote code execution, enabling attackers to run arbitrary PHP code, steal sensitive data, or manipulate the website's content and behavior. The vulnerability affects HeartStar versions up to 1.0.14. The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality and integrity is high (C:H/I:H), with no impact on availability (A:N). Although no public exploits are currently known, the nature of RFI vulnerabilities makes them attractive targets for attackers. The vulnerability was reserved in late September 2025 and published in December 2025. The lack of available patches at the time of disclosure increases the urgency for organizations to implement interim mitigations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying on the HeartStar theme in their PHP-based websites or content management systems. Successful exploitation can lead to unauthorized disclosure of sensitive information, website defacement, or full system compromise. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data breaches), and cause financial losses. Public-facing websites are especially vulnerable, as attackers can exploit the vulnerability remotely without authentication. The high confidentiality and integrity impact means that sensitive customer data or internal business logic could be exposed or altered. Although availability is not directly impacted, secondary effects such as website downtime due to remediation or attacker actions are possible. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly following disclosure.

Mitigation Recommendations

1. Monitor for official patches or updates from axiomthemes and apply them immediately once available. 2. Until patches are released, restrict PHP include paths using configuration directives such as open_basedir to limit file inclusion to trusted directories. 3. Employ Web Application Firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities, including suspicious URL parameters or remote file references. 4. Conduct code reviews and audits of the HeartStar theme and any customizations to identify and remediate unsafe include or require statements. 5. Disable allow_url_include in PHP configurations to prevent inclusion of remote files. 6. Implement strict input validation and sanitization on all user-supplied parameters that influence file paths. 7. Monitor web server logs for unusual requests that may indicate exploitation attempts. 8. Educate web administrators and developers about the risks of RFI vulnerabilities and best secure coding practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:19:17.077Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0494eb3efac366ffa75

Added to database: 12/18/2025, 7:42:01 AM

Last enriched: 1/20/2026, 9:29:04 PM

Last updated: 2/7/2026, 4:01:19 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats