CVE-2025-60078: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Agence web Eoxia - Montpellier Task Manager
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Agence web Eoxia - Montpellier Task Manager task-manager allows PHP Local File Inclusion.This issue affects Task Manager: from n/a through <= 3.0.2.
AI Analysis
Technical Summary
CVE-2025-60078 is a Local File Inclusion (LFI) vulnerability found in the PHP-based Task Manager software developed by Agence web Eoxia - Montpellier. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the local filesystem. This can lead to disclosure of sensitive information such as configuration files, source code, or credentials stored on the server. In some cases, LFI can be leveraged to achieve remote code execution, especially if the attacker can upload files or exploit other chained vulnerabilities. The affected versions include all releases up to 3.0.2. No public exploits are currently known, but the vulnerability is publicly disclosed and assigned CVE-2025-60078. The lack of a CVSS score indicates that detailed impact assessment is pending, but the nature of LFI vulnerabilities typically poses a significant risk. The vulnerability affects the confidentiality and integrity of the system by exposing internal files and potentially allowing unauthorized code execution. The vulnerability is particularly relevant for organizations using this Task Manager software for project or task management, especially those hosting it on web servers accessible from the internet. Since the vendor is based in Montpellier, France, European organizations in France and neighboring countries are likely users and thus at risk. The vulnerability requires no authentication or user interaction, increasing its exploitability. The absence of patches at the time of disclosure necessitates immediate mitigation through configuration hardening and input validation.
Potential Impact
The primary impact of CVE-2025-60078 is the potential exposure of sensitive internal files, which can include configuration files, credentials, or proprietary source code, compromising confidentiality. If attackers can chain this vulnerability with file upload or other weaknesses, they may achieve remote code execution, severely impacting system integrity and availability. For European organizations, especially those in sectors relying on the Task Manager software for operational workflows, this could lead to data breaches, operational disruption, and reputational damage. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks. Organizations with internet-facing installations are particularly vulnerable. The impact is heightened in regulated industries subject to strict data protection laws such as GDPR, where unauthorized data exposure can lead to significant fines and legal consequences. Additionally, the lack of an available patch at disclosure time means organizations must rely on interim mitigations, increasing the window of exposure.
Mitigation Recommendations
1. Immediately restrict access to the Task Manager application to trusted networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on all parameters used in include or require statements to prevent manipulation. 3. Configure PHP settings to disable allow_url_include and limit include paths using open_basedir to prevent inclusion of unauthorized files. 4. Monitor web server logs for suspicious requests attempting to exploit file inclusion. 5. Employ Web Application Firewalls (WAFs) with rules targeting LFI attack patterns to block malicious requests. 6. Regularly back up application and server data to enable recovery in case of compromise. 7. Engage with the vendor for timely patch releases and apply updates as soon as they become available. 8. Conduct code audits and penetration testing focused on file inclusion and input validation vulnerabilities. 9. Educate development and operations teams about secure coding practices related to file handling in PHP. 10. Consider isolating the application in a container or sandbox environment to limit potential damage from exploitation.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium
CVE-2025-60078: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Agence web Eoxia - Montpellier Task Manager
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Agence web Eoxia - Montpellier Task Manager task-manager allows PHP Local File Inclusion.This issue affects Task Manager: from n/a through <= 3.0.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-60078 is a Local File Inclusion (LFI) vulnerability found in the PHP-based Task Manager software developed by Agence web Eoxia - Montpellier. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the local filesystem. This can lead to disclosure of sensitive information such as configuration files, source code, or credentials stored on the server. In some cases, LFI can be leveraged to achieve remote code execution, especially if the attacker can upload files or exploit other chained vulnerabilities. The affected versions include all releases up to 3.0.2. No public exploits are currently known, but the vulnerability is publicly disclosed and assigned CVE-2025-60078. The lack of a CVSS score indicates that detailed impact assessment is pending, but the nature of LFI vulnerabilities typically poses a significant risk. The vulnerability affects the confidentiality and integrity of the system by exposing internal files and potentially allowing unauthorized code execution. The vulnerability is particularly relevant for organizations using this Task Manager software for project or task management, especially those hosting it on web servers accessible from the internet. Since the vendor is based in Montpellier, France, European organizations in France and neighboring countries are likely users and thus at risk. The vulnerability requires no authentication or user interaction, increasing its exploitability. The absence of patches at the time of disclosure necessitates immediate mitigation through configuration hardening and input validation.
Potential Impact
The primary impact of CVE-2025-60078 is the potential exposure of sensitive internal files, which can include configuration files, credentials, or proprietary source code, compromising confidentiality. If attackers can chain this vulnerability with file upload or other weaknesses, they may achieve remote code execution, severely impacting system integrity and availability. For European organizations, especially those in sectors relying on the Task Manager software for operational workflows, this could lead to data breaches, operational disruption, and reputational damage. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks. Organizations with internet-facing installations are particularly vulnerable. The impact is heightened in regulated industries subject to strict data protection laws such as GDPR, where unauthorized data exposure can lead to significant fines and legal consequences. Additionally, the lack of an available patch at disclosure time means organizations must rely on interim mitigations, increasing the window of exposure.
Mitigation Recommendations
1. Immediately restrict access to the Task Manager application to trusted networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on all parameters used in include or require statements to prevent manipulation. 3. Configure PHP settings to disable allow_url_include and limit include paths using open_basedir to prevent inclusion of unauthorized files. 4. Monitor web server logs for suspicious requests attempting to exploit file inclusion. 5. Employ Web Application Firewalls (WAFs) with rules targeting LFI attack patterns to block malicious requests. 6. Regularly back up application and server data to enable recovery in case of compromise. 7. Engage with the vendor for timely patch releases and apply updates as soon as they become available. 8. Conduct code audits and penetration testing focused on file inclusion and input validation vulnerabilities. 9. Educate development and operations teams about secure coding practices related to file handling in PHP. 10. Consider isolating the application in a container or sandbox environment to limit potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:19:48.981Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b04c4eb3efac36700367
Added to database: 12/18/2025, 7:42:04 AM
Last enriched: 12/18/2025, 8:32:24 AM
Last updated: 12/19/2025, 8:25:10 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66501: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2025-66500: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. webplugins.foxit.com
MediumCVE-2025-66499: CWE-190 Integer Overflow or Wraparound in Foxit Software Inc. Foxit PDF Reader
HighCVE-2025-66498: CWE-125 Out-of-bounds Read in Foxit Software Inc. Foxit PDF Reader
MediumCVE-2025-66497: CWE-125 Out-of-bounds Read in Foxit Software Inc. Foxit PDF Reader
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.