CVE-2025-60078: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Agence web Eoxia - Montpellier Task Manager
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Agence web Eoxia - Montpellier Task Manager task-manager allows PHP Local File Inclusion.This issue affects Task Manager: from n/a through <= 3.0.2.
AI Analysis
Technical Summary
CVE-2025-60078 is a Remote File Inclusion (RFI) vulnerability found in the PHP-based Task Manager software developed by Agence web Eoxia - Montpellier, affecting versions up to and including 3.0.2. The vulnerability arises from improper control over the filename parameter used in PHP's include or require statements, which allows an attacker to specify a remote URL hosting malicious PHP code. When exploited, the server executes this remote code, leading to unauthorized disclosure of sensitive information (confidentiality impact), while integrity and availability remain unaffected. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U). The flaw does not require authentication, making it accessible to any remote attacker. Although no known exploits are currently reported in the wild, the nature of RFI vulnerabilities historically makes them attractive targets for attackers aiming to gain initial access or exfiltrate data. The affected software is used for task management, which often contains sensitive organizational data and workflows, increasing the potential impact of a breach. The vulnerability was reserved in late September 2025 and published in December 2025, with no official patches currently listed, emphasizing the need for immediate mitigation strategies.
Potential Impact
For European organizations, exploitation of CVE-2025-60078 could lead to unauthorized disclosure of sensitive task management data, including project details, personnel assignments, and potentially confidential business information. This breach of confidentiality could result in competitive disadvantage, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since the vulnerability does not affect integrity or availability, attackers are less likely to disrupt operations directly but could use the foothold for further lateral movement or espionage. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The remote, unauthenticated nature of the exploit increases exposure, especially for externally facing instances of the Task Manager software. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. European entities relying on this software without mitigations or patches are vulnerable to targeted attacks, especially in countries with higher adoption rates or strategic importance in digital infrastructure.
Mitigation Recommendations
1. Immediately audit all instances of Agence web Eoxia - Montpellier Task Manager to identify affected versions (<= 3.0.2). 2. If available, apply official patches or updates from the vendor as soon as they are released. 3. Implement strict input validation and sanitization on all parameters used in include/require statements to prevent injection of remote URLs. 4. Disable allow_url_include and allow_url_fopen directives in PHP configurations to prevent remote file inclusion. 5. Employ Web Application Firewalls (WAFs) with rules designed to detect and block RFI attack patterns targeting PHP applications. 6. Restrict network egress from web servers to prevent unauthorized outbound connections that could facilitate remote code inclusion. 7. Conduct regular security assessments and code reviews focusing on file inclusion mechanisms. 8. Monitor logs for suspicious requests containing URL parameters or unexpected file paths. 9. Educate developers and administrators about secure coding practices related to dynamic file inclusion. 10. Consider isolating the Task Manager application in a segmented network zone to limit potential lateral movement in case of compromise.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain
CVE-2025-60078: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Agence web Eoxia - Montpellier Task Manager
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Agence web Eoxia - Montpellier Task Manager task-manager allows PHP Local File Inclusion.This issue affects Task Manager: from n/a through <= 3.0.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-60078 is a Remote File Inclusion (RFI) vulnerability found in the PHP-based Task Manager software developed by Agence web Eoxia - Montpellier, affecting versions up to and including 3.0.2. The vulnerability arises from improper control over the filename parameter used in PHP's include or require statements, which allows an attacker to specify a remote URL hosting malicious PHP code. When exploited, the server executes this remote code, leading to unauthorized disclosure of sensitive information (confidentiality impact), while integrity and availability remain unaffected. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U). The flaw does not require authentication, making it accessible to any remote attacker. Although no known exploits are currently reported in the wild, the nature of RFI vulnerabilities historically makes them attractive targets for attackers aiming to gain initial access or exfiltrate data. The affected software is used for task management, which often contains sensitive organizational data and workflows, increasing the potential impact of a breach. The vulnerability was reserved in late September 2025 and published in December 2025, with no official patches currently listed, emphasizing the need for immediate mitigation strategies.
Potential Impact
For European organizations, exploitation of CVE-2025-60078 could lead to unauthorized disclosure of sensitive task management data, including project details, personnel assignments, and potentially confidential business information. This breach of confidentiality could result in competitive disadvantage, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since the vulnerability does not affect integrity or availability, attackers are less likely to disrupt operations directly but could use the foothold for further lateral movement or espionage. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The remote, unauthenticated nature of the exploit increases exposure, especially for externally facing instances of the Task Manager software. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. European entities relying on this software without mitigations or patches are vulnerable to targeted attacks, especially in countries with higher adoption rates or strategic importance in digital infrastructure.
Mitigation Recommendations
1. Immediately audit all instances of Agence web Eoxia - Montpellier Task Manager to identify affected versions (<= 3.0.2). 2. If available, apply official patches or updates from the vendor as soon as they are released. 3. Implement strict input validation and sanitization on all parameters used in include/require statements to prevent injection of remote URLs. 4. Disable allow_url_include and allow_url_fopen directives in PHP configurations to prevent remote file inclusion. 5. Employ Web Application Firewalls (WAFs) with rules designed to detect and block RFI attack patterns targeting PHP applications. 6. Restrict network egress from web servers to prevent unauthorized outbound connections that could facilitate remote code inclusion. 7. Conduct regular security assessments and code reviews focusing on file inclusion mechanisms. 8. Monitor logs for suspicious requests containing URL parameters or unexpected file paths. 9. Educate developers and administrators about secure coding practices related to dynamic file inclusion. 10. Consider isolating the Task Manager application in a segmented network zone to limit potential lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:19:48.981Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b04c4eb3efac36700367
Added to database: 12/18/2025, 7:42:04 AM
Last enriched: 1/20/2026, 9:38:27 PM
Last updated: 2/4/2026, 6:30:45 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67850: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67849: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67848: Improper Handling of Insufficient Permissions or Privileges
HighCVE-2025-29867: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Hancom Inc. Hancom Office 2018
HighCVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.