CVE-2025-60072: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Processby Anchor smooth scroll
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Processby Anchor smooth scroll anchor-smooth-scroll allows PHP Local File Inclusion.This issue affects Anchor smooth scroll: from n/a through <= 1.0.2.
AI Analysis
Technical Summary
CVE-2025-60072 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' specifically affecting the Processby Anchor smooth scroll PHP component up to version 1.0.2. This vulnerability enables Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP's include or require statements to load arbitrary files from the local filesystem. Unlike Remote File Inclusion (RFI), which allows loading files from remote servers, LFI exploits can still lead to severe consequences such as reading sensitive configuration files, source code, or log files, and in some cases, enabling code execution through log poisoning or other techniques. The vulnerability is exploitable remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 8.2 reflects a high severity due to the potential confidentiality impact (C:H), moderate integrity impact (I:L), and no availability impact (A:N). The vulnerability arises from insufficient validation or sanitization of input controlling the filename in include/require statements, allowing attackers to traverse directories or specify unintended files. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a critical concern for web applications using this component. The lack of available patches at the time of publication necessitates immediate mitigation through configuration changes and code review. This vulnerability is particularly relevant for web servers running PHP applications that incorporate the Anchor smooth scroll library, which is used to enhance user interface behavior but inadvertently introduces this security flaw.
Potential Impact
For European organizations, the impact of CVE-2025-60072 can be significant, especially for those relying on PHP-based web applications that include the vulnerable Anchor smooth scroll component. Successful exploitation can lead to unauthorized disclosure of sensitive data such as configuration files, credentials, or personal data protected under GDPR, resulting in compliance violations and reputational damage. Partial integrity loss may occur if attackers leverage LFI to execute arbitrary code through advanced techniques like log poisoning, potentially leading to further compromise of web servers or internal networks. The vulnerability does not directly affect availability but can indirectly cause service disruptions if exploited to escalate privileges or deploy malware. Given the widespread use of PHP in European web infrastructure, organizations in sectors such as finance, healthcare, and government are at heightened risk. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of automated exploitation attempts. Additionally, the exposure of sensitive data could facilitate subsequent targeted attacks or lateral movement within affected networks.
Mitigation Recommendations
To mitigate CVE-2025-60072, European organizations should implement the following specific measures: 1) Immediately audit all web applications to identify usage of the Anchor smooth scroll component and determine affected versions. 2) Apply any available patches or updates from the vendor as soon as they are released. 3) In the absence of patches, modify the PHP code to enforce strict input validation and sanitization on any parameters used in include or require statements, ensuring only allowed filenames or paths are accepted. 4) Disable allow_url_include and ensure allow_url_fopen is set to off in PHP configurations to prevent remote file inclusion vectors. 5) Employ web application firewalls (WAFs) with rules designed to detect and block LFI attack patterns, such as directory traversal sequences. 6) Restrict file system permissions to limit the PHP process's access to only necessary directories, minimizing the impact of potential LFI exploitation. 7) Monitor web server logs for suspicious requests indicative of LFI attempts and respond promptly. 8) Conduct security code reviews and penetration testing focused on file inclusion vulnerabilities. 9) Educate development teams about secure coding practices related to dynamic file inclusion. These targeted actions go beyond generic advice and address the root cause and exploitation vectors of this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-60072: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Processby Anchor smooth scroll
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Processby Anchor smooth scroll anchor-smooth-scroll allows PHP Local File Inclusion.This issue affects Anchor smooth scroll: from n/a through <= 1.0.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-60072 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' specifically affecting the Processby Anchor smooth scroll PHP component up to version 1.0.2. This vulnerability enables Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP's include or require statements to load arbitrary files from the local filesystem. Unlike Remote File Inclusion (RFI), which allows loading files from remote servers, LFI exploits can still lead to severe consequences such as reading sensitive configuration files, source code, or log files, and in some cases, enabling code execution through log poisoning or other techniques. The vulnerability is exploitable remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 8.2 reflects a high severity due to the potential confidentiality impact (C:H), moderate integrity impact (I:L), and no availability impact (A:N). The vulnerability arises from insufficient validation or sanitization of input controlling the filename in include/require statements, allowing attackers to traverse directories or specify unintended files. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a critical concern for web applications using this component. The lack of available patches at the time of publication necessitates immediate mitigation through configuration changes and code review. This vulnerability is particularly relevant for web servers running PHP applications that incorporate the Anchor smooth scroll library, which is used to enhance user interface behavior but inadvertently introduces this security flaw.
Potential Impact
For European organizations, the impact of CVE-2025-60072 can be significant, especially for those relying on PHP-based web applications that include the vulnerable Anchor smooth scroll component. Successful exploitation can lead to unauthorized disclosure of sensitive data such as configuration files, credentials, or personal data protected under GDPR, resulting in compliance violations and reputational damage. Partial integrity loss may occur if attackers leverage LFI to execute arbitrary code through advanced techniques like log poisoning, potentially leading to further compromise of web servers or internal networks. The vulnerability does not directly affect availability but can indirectly cause service disruptions if exploited to escalate privileges or deploy malware. Given the widespread use of PHP in European web infrastructure, organizations in sectors such as finance, healthcare, and government are at heightened risk. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of automated exploitation attempts. Additionally, the exposure of sensitive data could facilitate subsequent targeted attacks or lateral movement within affected networks.
Mitigation Recommendations
To mitigate CVE-2025-60072, European organizations should implement the following specific measures: 1) Immediately audit all web applications to identify usage of the Anchor smooth scroll component and determine affected versions. 2) Apply any available patches or updates from the vendor as soon as they are released. 3) In the absence of patches, modify the PHP code to enforce strict input validation and sanitization on any parameters used in include or require statements, ensuring only allowed filenames or paths are accepted. 4) Disable allow_url_include and ensure allow_url_fopen is set to off in PHP configurations to prevent remote file inclusion vectors. 5) Employ web application firewalls (WAFs) with rules designed to detect and block LFI attack patterns, such as directory traversal sequences. 6) Restrict file system permissions to limit the PHP process's access to only necessary directories, minimizing the impact of potential LFI exploitation. 7) Monitor web server logs for suspicious requests indicative of LFI attempts and respond promptly. 8) Conduct security code reviews and penetration testing focused on file inclusion vulnerabilities. 9) Educate development teams about secure coding practices related to dynamic file inclusion. These targeted actions go beyond generic advice and address the root cause and exploitation vectors of this specific vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:19:48.980Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b04c4eb3efac3670035e
Added to database: 12/18/2025, 7:42:04 AM
Last enriched: 1/20/2026, 9:36:45 PM
Last updated: 2/7/2026, 11:07:03 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.