Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60066: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Katelyn

0
High
VulnerabilityCVE-2025-60066cvecve-2025-60066
Published: Thu Dec 18 2025 (12/18/2025, 07:22:04 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Katelyn

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Katelyn katelyn allows PHP Local File Inclusion.This issue affects Katelyn: from n/a through <= 1.0.10.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:34:40 UTC

Technical Analysis

CVE-2025-60066 is a Remote File Inclusion (RFI) vulnerability found in the axiomthemes Katelyn WordPress theme, affecting versions up to and including 1.0.10. The root cause is improper control over the filename parameter used in PHP include or require statements, allowing attackers to supply malicious remote URLs that the server then includes and executes. This flaw enables an unauthenticated attacker to execute arbitrary PHP code remotely, compromising the confidentiality and integrity of the affected web server and potentially the entire hosting environment. The vulnerability does not impact availability directly but can lead to severe data breaches or site defacement. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction needed, unchanged scope, and high confidentiality and integrity impact. Although no known exploits are currently reported in the wild, the vulnerability’s nature and ease of exploitation make it a critical risk for websites using the Katelyn theme. The vulnerability was reserved in late September 2025 and published in December 2025, with no official patches yet linked, highlighting the urgency for theme users to monitor for updates or apply temporary mitigations. The attack typically involves tricking a user into visiting a crafted URL that triggers the inclusion of a remote malicious PHP file, leading to full compromise of the web application environment.

Potential Impact

For European organizations, this vulnerability poses a significant threat to websites running the Katelyn WordPress theme, potentially allowing attackers to execute arbitrary code remotely without authentication. This can lead to data theft, unauthorized access to sensitive information, defacement, or use of the compromised server as a pivot point for further attacks within the corporate network. Given the widespread use of WordPress across Europe, especially in small and medium enterprises, government portals, and e-commerce platforms, exploitation could disrupt business operations and damage reputations. The high confidentiality and integrity impact means sensitive customer data, intellectual property, and internal communications could be exposed or altered. Although availability is not directly affected, secondary impacts such as site downtime due to remediation or attacker actions are possible. The requirement for user interaction slightly reduces the risk but does not eliminate it, as phishing or social engineering can facilitate exploitation. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score and ease of exploitation necessitate immediate attention.

Mitigation Recommendations

Organizations should prioritize monitoring for official patches or updates from axiomthemes and apply them immediately once available. Until patches are released, administrators should implement strict input validation and sanitization to prevent malicious filename parameters from being processed. Employing web application firewalls (WAFs) with rules specifically designed to detect and block Remote File Inclusion attempts can provide effective interim protection. Restricting PHP include paths to local directories via configuration (e.g., using open_basedir in PHP) can limit the ability to include remote files. Additionally, disabling allow_url_include and allow_url_fopen directives in PHP configurations reduces the attack surface. Regularly auditing WordPress themes and plugins for vulnerabilities and minimizing the use of third-party themes without active maintenance is recommended. User awareness training to recognize phishing attempts can reduce the likelihood of successful exploitation requiring user interaction. Finally, maintaining comprehensive backups and incident response plans ensures rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:19:39.458Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04c4eb3efac3670034c

Added to database: 12/18/2025, 7:42:04 AM

Last enriched: 1/20/2026, 9:34:40 PM

Last updated: 2/4/2026, 7:18:06 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats