Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60060: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Pubzinne

0
High
VulnerabilityCVE-2025-60060cvecve-2025-60060
Published: Thu Dec 18 2025 (12/18/2025, 07:22:03 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Pubzinne

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Pubzinne pubzinne allows PHP Local File Inclusion.This issue affects Pubzinne: from n/a through <= 1.0.12.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:32:45 UTC

Technical Analysis

CVE-2025-60060 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly known as a Remote File Inclusion (RFI) vulnerability, found in the axiomthemes Pubzinne product. This vulnerability arises because the application does not properly validate or restrict the filenames used in PHP include or require statements, allowing an attacker to supply a malicious file path. When exploited, this can lead to the inclusion and execution of arbitrary PHP code from a remote source or local files, resulting in full compromise of the web server environment. The affected versions include all Pubzinne releases up to and including version 1.0.12. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with the vector string AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network without privileges or user interaction, but requires high attack complexity. The impact covers confidentiality (data disclosure), integrity (code execution/modification), and availability (service disruption). No patches or exploit code are currently publicly available, but the vulnerability is publicly disclosed and should be considered exploitable. The vulnerability is particularly dangerous in shared hosting or multi-tenant environments where code execution can lead to lateral movement or data theft. The root cause is insufficient input validation and lack of secure coding practices around dynamic file inclusion in PHP. This class of vulnerability is well-known and has historically been exploited to compromise websites and servers. Organizations using the Pubzinne theme should prioritize identifying affected installations and applying mitigations immediately.

Potential Impact

For European organizations, the impact of CVE-2025-60060 can be severe. Exploitation allows attackers to execute arbitrary code on vulnerable web servers, potentially leading to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. Confidentiality is at high risk as attackers can access sensitive data stored or processed by the affected web applications. Integrity is compromised because attackers can modify website content or inject malicious scripts, impacting trust and brand reputation. Availability may be affected if attackers disrupt services or deploy ransomware. Given the widespread use of PHP-based CMS and themes in Europe, especially in sectors like e-commerce, media, and government, the threat could lead to significant operational and financial damage. The high CVSS score reflects the critical nature of this vulnerability, and the lack of required privileges or user interaction increases the likelihood of exploitation. Although no known exploits are currently in the wild, the public disclosure means attackers may develop exploits soon, increasing urgency for mitigation.

Mitigation Recommendations

1. Immediate identification of all Pubzinne theme installations across organizational assets and verifying their versions. 2. Apply official patches or updates from axiomthemes as soon as they become available. If no patch is available, consider temporarily disabling or removing the vulnerable theme. 3. Implement strict input validation and sanitization on all parameters that influence file inclusion, ensuring only allowed filenames or paths are accepted. 4. Employ web application firewalls (WAFs) with rules designed to detect and block remote file inclusion attempts and suspicious URL patterns. 5. Restrict PHP configuration settings such as 'allow_url_include' to 'Off' to prevent remote file inclusion. 6. Use least privilege principles for web server processes to limit the impact of potential code execution. 7. Monitor logs for unusual file inclusion attempts or errors related to include/require statements. 8. Conduct security awareness training for developers on secure coding practices to prevent similar vulnerabilities. 9. Consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts in real time. 10. Regularly back up website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:19:39.457Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04b4eb3efac366ffb11

Added to database: 12/18/2025, 7:42:03 AM

Last enriched: 1/20/2026, 9:32:45 PM

Last updated: 2/7/2026, 11:24:36 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats