CVE-2025-60193: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Premmerce Premmerce User Roles
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce User Roles premmerce-user-roles allows PHP Local File Inclusion.This issue affects Premmerce User Roles: from n/a through <= 1.0.13.
AI Analysis
Technical Summary
CVE-2025-60193 is a vulnerability identified in the Premmerce User Roles plugin for WordPress, specifically versions up to and including 1.0.13. The issue arises from improper control of filenames used in PHP include or require statements, leading to a Local File Inclusion (LFI) vulnerability. LFI vulnerabilities allow attackers to trick the application into including files from the local filesystem, which can lead to arbitrary code execution if the attacker can control or influence the included file content. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, low attack complexity), no privileges required, and the impact on integrity (code execution). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to websites using the affected plugin. The Premmerce User Roles plugin is used to manage user roles and capabilities in WordPress e-commerce environments, making it a critical component for access control. Attackers exploiting this vulnerability could execute arbitrary PHP code, potentially leading to full site compromise, data manipulation, or pivoting to other internal systems. The vulnerability was published on November 6, 2025, with the issue reserved on September 25, 2025. No official patches or mitigation links are currently provided, indicating the need for immediate attention by site administrators.
Potential Impact
For European organizations, especially those operating e-commerce websites on WordPress using the Premmerce User Roles plugin, this vulnerability presents a significant risk. Successful exploitation can lead to unauthorized code execution, compromising the integrity of the website and potentially exposing sensitive customer data or business logic. This can result in reputational damage, financial loss, and regulatory penalties under GDPR due to data breaches. Additionally, attackers could leverage the compromised site as a foothold for further attacks within the network, increasing the scope of impact. Given the plugin’s role in managing user permissions, attackers might escalate privileges or bypass access controls, exacerbating the damage. The lack of required authentication and user interaction increases the likelihood of automated exploitation attempts, raising the urgency for European organizations to act promptly. The threat is particularly critical for sectors with high online transaction volumes and sensitive data, such as retail, finance, and healthcare.
Mitigation Recommendations
1. Monitor official Premmerce channels for patches or updates addressing CVE-2025-60193 and apply them immediately upon release. 2. In the interim, restrict PHP include paths by configuring the server’s open_basedir directive to limit accessible directories, reducing the risk of arbitrary file inclusion. 3. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block LFI attack patterns, such as suspicious URL parameters or directory traversal sequences. 4. Conduct code reviews and audits of the Premmerce User Roles plugin usage to identify and remediate any unsafe dynamic file inclusion practices. 5. Disable or remove the plugin if it is not essential to reduce the attack surface. 6. Implement strict file permissions on the web server to prevent unauthorized file modifications. 7. Monitor web server logs for unusual requests that may indicate exploitation attempts. 8. Educate development and security teams about secure coding practices related to file inclusion and input validation to prevent similar vulnerabilities in custom code.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-60193: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Premmerce Premmerce User Roles
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce User Roles premmerce-user-roles allows PHP Local File Inclusion.This issue affects Premmerce User Roles: from n/a through <= 1.0.13.
AI-Powered Analysis
Technical Analysis
CVE-2025-60193 is a vulnerability identified in the Premmerce User Roles plugin for WordPress, specifically versions up to and including 1.0.13. The issue arises from improper control of filenames used in PHP include or require statements, leading to a Local File Inclusion (LFI) vulnerability. LFI vulnerabilities allow attackers to trick the application into including files from the local filesystem, which can lead to arbitrary code execution if the attacker can control or influence the included file content. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, low attack complexity), no privileges required, and the impact on integrity (code execution). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to websites using the affected plugin. The Premmerce User Roles plugin is used to manage user roles and capabilities in WordPress e-commerce environments, making it a critical component for access control. Attackers exploiting this vulnerability could execute arbitrary PHP code, potentially leading to full site compromise, data manipulation, or pivoting to other internal systems. The vulnerability was published on November 6, 2025, with the issue reserved on September 25, 2025. No official patches or mitigation links are currently provided, indicating the need for immediate attention by site administrators.
Potential Impact
For European organizations, especially those operating e-commerce websites on WordPress using the Premmerce User Roles plugin, this vulnerability presents a significant risk. Successful exploitation can lead to unauthorized code execution, compromising the integrity of the website and potentially exposing sensitive customer data or business logic. This can result in reputational damage, financial loss, and regulatory penalties under GDPR due to data breaches. Additionally, attackers could leverage the compromised site as a foothold for further attacks within the network, increasing the scope of impact. Given the plugin’s role in managing user permissions, attackers might escalate privileges or bypass access controls, exacerbating the damage. The lack of required authentication and user interaction increases the likelihood of automated exploitation attempts, raising the urgency for European organizations to act promptly. The threat is particularly critical for sectors with high online transaction volumes and sensitive data, such as retail, finance, and healthcare.
Mitigation Recommendations
1. Monitor official Premmerce channels for patches or updates addressing CVE-2025-60193 and apply them immediately upon release. 2. In the interim, restrict PHP include paths by configuring the server’s open_basedir directive to limit accessible directories, reducing the risk of arbitrary file inclusion. 3. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block LFI attack patterns, such as suspicious URL parameters or directory traversal sequences. 4. Conduct code reviews and audits of the Premmerce User Roles plugin usage to identify and remediate any unsafe dynamic file inclusion practices. 5. Disable or remove the plugin if it is not essential to reduce the attack surface. 6. Implement strict file permissions on the web server to prevent unauthorized file modifications. 7. Monitor web server logs for unusual requests that may indicate exploitation attempts. 8. Educate development and security teams about secure coding practices related to file inclusion and input validation to prevent similar vulnerabilities in custom code.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:34.981Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690cc809ca26fb4dd2f594cc
Added to database: 11/6/2025, 4:08:41 PM
Last enriched: 11/13/2025, 5:24:43 PM
Last updated: 11/22/2025, 8:06:34 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumCVE-2025-12752: CWE-345 Insufficient Verification of Data Authenticity in scottpaterson Subscriptions & Memberships for PayPal
MediumCVE-2025-11186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in humanityco Cookie Notice & Compliance for GDPR / CCPA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.