Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60066: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Katelyn

0
High
VulnerabilityCVE-2025-60066cvecve-2025-60066
Published: Thu Dec 18 2025 (12/18/2025, 07:22:04 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Katelyn

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Katelyn katelyn allows PHP Local File Inclusion.This issue affects Katelyn: from n/a through <= 1.0.10.

AI-Powered Analysis

AILast updated: 12/18/2025, 08:42:54 UTC

Technical Analysis

CVE-2025-60066 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically impacting the axiomthemes Katelyn WordPress theme versions up to and including 1.0.10. This vulnerability enables Remote File Inclusion (RFI) or Local File Inclusion (LFI) attacks by allowing an attacker to manipulate the filename parameter used in PHP's include or require statements without proper validation or sanitization. This flaw can be exploited by crafting malicious requests that cause the server to include and execute arbitrary remote or local files. The consequence of successful exploitation includes arbitrary code execution, which can lead to full site takeover, data leakage, defacement, or pivoting to internal networks. Although no public exploits are currently known, the vulnerability is publicly disclosed and unpatched, increasing the risk of future exploitation. The vulnerability affects WordPress sites using the Katelyn theme, which is popular among bloggers and small businesses. The lack of a CVSS score necessitates an independent severity assessment based on the vulnerability's characteristics. The vulnerability does not require authentication, and exploitation can be performed remotely via HTTP requests, increasing its risk profile. The absence of patches at the time of disclosure means organizations must implement interim mitigations and monitor for updates.

Potential Impact

For European organizations, the impact of CVE-2025-60066 can be significant, especially for those relying on WordPress sites with the Katelyn theme for business operations, communications, or e-commerce. Successful exploitation could lead to unauthorized code execution, allowing attackers to deface websites, steal sensitive customer data, deploy malware, or use compromised servers as a foothold for further attacks within corporate networks. This could result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions. Given the widespread use of WordPress in Europe and the popularity of themes like Katelyn among SMEs and content creators, the attack surface is considerable. Additionally, sectors such as media, retail, and professional services that rely heavily on web presence are at elevated risk. The vulnerability's remote exploitation capability without authentication means attackers can target sites en masse, increasing the likelihood of widespread impact if left unmitigated.

Mitigation Recommendations

1. Immediate action should be to inventory all WordPress installations within the organization and identify instances using the Katelyn theme, especially versions up to 1.0.10. 2. Monitor official axiomthemes channels and Patchstack for the release of security patches and apply them promptly once available. 3. Until patches are released, implement input validation and sanitization on any parameters that influence file inclusion paths in the theme's PHP code, restricting them to known safe values or whitelisted directories. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious requests attempting to manipulate include/require parameters. 5. Restrict PHP's allow_url_include directive to 'Off' in php.ini to prevent remote file inclusion if not already disabled. 6. Limit file system permissions for the web server user to prevent unauthorized file access or modifications. 7. Conduct regular vulnerability scans and penetration tests focusing on web application components. 8. Educate web administrators on the risks of using outdated themes and the importance of timely updates. 9. Consider temporary removal or disabling of the Katelyn theme if immediate patching is not feasible and the site functionality allows. 10. Monitor logs for unusual file inclusion attempts or errors indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:19:39.458Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04c4eb3efac3670034c

Added to database: 12/18/2025, 7:42:04 AM

Last enriched: 12/18/2025, 8:42:54 AM

Last updated: 12/19/2025, 7:40:21 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats