CVE-2025-60150: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpshuffle Subscribe to Download
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpshuffle Subscribe to Download allows PHP Local File Inclusion. This issue affects Subscribe to Download: from n/a through 2.0.9.
AI Analysis
Technical Summary
CVE-2025-60150 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the 'Subscribe to Download' plugin developed by wpshuffle, up to version 2.0.9. The vulnerability enables a PHP Local File Inclusion (LFI) attack vector, where an attacker can manipulate the filename parameter used in PHP include or require functions to load unintended files from the local filesystem. This can lead to arbitrary code execution, disclosure of sensitive information, or complete compromise of the affected web server. The CVSS 3.1 base score is 7.5, indicating a high severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) shows that the attack is network exploitable (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree. However, the attack complexity is high (AC:H), meaning exploitation requires specific conditions or knowledge. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises because the plugin does not properly sanitize or restrict the filename input used in PHP include/require statements, allowing attackers to traverse directories or specify arbitrary local files. This can lead to disclosure of configuration files, source code, or injection of malicious code if combined with other vulnerabilities or misconfigurations. Since the vulnerability is local file inclusion rather than remote file inclusion, the attacker is limited to files accessible on the server's filesystem, but this still poses a significant risk, especially if sensitive files or writable directories are accessible. The plugin is typically used in WordPress environments to manage subscription-based downloads, so affected systems are primarily WordPress websites using this plugin version or earlier.
Potential Impact
For European organizations, the impact of CVE-2025-60150 can be significant, particularly for those relying on WordPress websites with the 'Subscribe to Download' plugin installed. Successful exploitation can lead to unauthorized disclosure of sensitive data such as configuration files, user credentials, or proprietary content. It can also enable attackers to execute arbitrary code, potentially leading to full server compromise, defacement, or pivoting to internal networks. This is especially critical for organizations handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. E-commerce, media, and subscription-based service providers are particularly at risk due to the nature of the plugin’s functionality. Moreover, the high impact on confidentiality, integrity, and availability means that business operations could be disrupted, customer trust eroded, and financial losses incurred. Given the network exploitability and lack of required user interaction, attackers can remotely target vulnerable sites, increasing the threat landscape. Although exploitation complexity is high, skilled attackers or automated tools could still leverage this vulnerability once more details or exploits become available. The absence of patches at the time of publication further elevates risk until mitigations or updates are applied.
Mitigation Recommendations
To mitigate CVE-2025-60150 effectively, European organizations should take the following specific actions: 1) Immediately audit all WordPress installations to identify the presence of the 'Subscribe to Download' plugin, especially versions up to 2.0.9. 2) Disable or remove the plugin temporarily if it cannot be updated or patched promptly. 3) Monitor web server logs for suspicious requests attempting to manipulate include parameters or unusual file access patterns indicative of LFI attempts. 4) Implement Web Application Firewall (WAF) rules tailored to detect and block attempts to exploit file inclusion vulnerabilities, such as blocking requests with directory traversal sequences or suspicious parameter values. 5) Harden PHP configurations by disabling dangerous functions (e.g., allow_url_include=Off, open_basedir restrictions) to limit file inclusion scope. 6) Restrict file permissions on the web server to prevent unauthorized reading of sensitive files and ensure that the web server user has minimal privileges. 7) Stay updated with vendor advisories and apply patches or updates as soon as they become available. 8) Conduct penetration testing focused on file inclusion vulnerabilities to verify the effectiveness of mitigations. 9) Educate developers and administrators on secure coding practices to prevent improper input validation in include/require statements. These measures go beyond generic advice by focusing on immediate plugin management, proactive detection, and environment hardening tailored to this vulnerability’s nature.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-60150: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpshuffle Subscribe to Download
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpshuffle Subscribe to Download allows PHP Local File Inclusion. This issue affects Subscribe to Download: from n/a through 2.0.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-60150 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the 'Subscribe to Download' plugin developed by wpshuffle, up to version 2.0.9. The vulnerability enables a PHP Local File Inclusion (LFI) attack vector, where an attacker can manipulate the filename parameter used in PHP include or require functions to load unintended files from the local filesystem. This can lead to arbitrary code execution, disclosure of sensitive information, or complete compromise of the affected web server. The CVSS 3.1 base score is 7.5, indicating a high severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) shows that the attack is network exploitable (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree. However, the attack complexity is high (AC:H), meaning exploitation requires specific conditions or knowledge. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises because the plugin does not properly sanitize or restrict the filename input used in PHP include/require statements, allowing attackers to traverse directories or specify arbitrary local files. This can lead to disclosure of configuration files, source code, or injection of malicious code if combined with other vulnerabilities or misconfigurations. Since the vulnerability is local file inclusion rather than remote file inclusion, the attacker is limited to files accessible on the server's filesystem, but this still poses a significant risk, especially if sensitive files or writable directories are accessible. The plugin is typically used in WordPress environments to manage subscription-based downloads, so affected systems are primarily WordPress websites using this plugin version or earlier.
Potential Impact
For European organizations, the impact of CVE-2025-60150 can be significant, particularly for those relying on WordPress websites with the 'Subscribe to Download' plugin installed. Successful exploitation can lead to unauthorized disclosure of sensitive data such as configuration files, user credentials, or proprietary content. It can also enable attackers to execute arbitrary code, potentially leading to full server compromise, defacement, or pivoting to internal networks. This is especially critical for organizations handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. E-commerce, media, and subscription-based service providers are particularly at risk due to the nature of the plugin’s functionality. Moreover, the high impact on confidentiality, integrity, and availability means that business operations could be disrupted, customer trust eroded, and financial losses incurred. Given the network exploitability and lack of required user interaction, attackers can remotely target vulnerable sites, increasing the threat landscape. Although exploitation complexity is high, skilled attackers or automated tools could still leverage this vulnerability once more details or exploits become available. The absence of patches at the time of publication further elevates risk until mitigations or updates are applied.
Mitigation Recommendations
To mitigate CVE-2025-60150 effectively, European organizations should take the following specific actions: 1) Immediately audit all WordPress installations to identify the presence of the 'Subscribe to Download' plugin, especially versions up to 2.0.9. 2) Disable or remove the plugin temporarily if it cannot be updated or patched promptly. 3) Monitor web server logs for suspicious requests attempting to manipulate include parameters or unusual file access patterns indicative of LFI attempts. 4) Implement Web Application Firewall (WAF) rules tailored to detect and block attempts to exploit file inclusion vulnerabilities, such as blocking requests with directory traversal sequences or suspicious parameter values. 5) Harden PHP configurations by disabling dangerous functions (e.g., allow_url_include=Off, open_basedir restrictions) to limit file inclusion scope. 6) Restrict file permissions on the web server to prevent unauthorized reading of sensitive files and ensure that the web server user has minimal privileges. 7) Stay updated with vendor advisories and apply patches or updates as soon as they become available. 8) Conduct penetration testing focused on file inclusion vulnerabilities to verify the effectiveness of mitigations. 9) Educate developers and administrators on secure coding practices to prevent improper input validation in include/require statements. These measures go beyond generic advice by focusing on immediate plugin management, proactive detection, and environment hardening tailored to this vulnerability’s nature.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:03.106Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d692e1828ba7f61ebe57de
Added to database: 9/26/2025, 1:19:29 PM
Last enriched: 9/26/2025, 1:20:02 PM
Last updated: 9/30/2025, 4:33:43 PM
Views: 9
Related Threats
CVE-2025-36262: CWE-1286 Improper Validation of Syntactic Correctness of Input in IBM Planning Analytics Local
MediumCVE-2025-36132: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Planning Analytics Local
MediumCVE-2025-10659: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in MegaSys Telenium Online Web Application:
CriticalCVE-2025-41098: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
HighCVE-2025-11149: Denial of Service (DoS) in node-static
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.