Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60193: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Premmerce Premmerce User Roles

0
High
VulnerabilityCVE-2025-60193cvecve-2025-60193
Published: Thu Nov 06 2025 (11/06/2025, 15:54:49 UTC)
Source: CVE Database V5
Vendor/Project: Premmerce
Product: Premmerce User Roles

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce User Roles premmerce-user-roles allows PHP Local File Inclusion.This issue affects Premmerce User Roles: from n/a through <= 1.0.13.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:24:43 UTC

Technical Analysis

CVE-2025-60193 is a vulnerability identified in the Premmerce User Roles plugin for WordPress, specifically versions up to and including 1.0.13. The issue arises from improper control of filenames used in PHP include or require statements, leading to a Local File Inclusion (LFI) vulnerability. LFI vulnerabilities allow attackers to trick the application into including files from the local filesystem, which can lead to arbitrary code execution if the attacker can control or influence the included file content. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, low attack complexity), no privileges required, and the impact on integrity (code execution). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to websites using the affected plugin. The Premmerce User Roles plugin is used to manage user roles and capabilities in WordPress e-commerce environments, making it a critical component for access control. Attackers exploiting this vulnerability could execute arbitrary PHP code, potentially leading to full site compromise, data manipulation, or pivoting to other internal systems. The vulnerability was published on November 6, 2025, with the issue reserved on September 25, 2025. No official patches or mitigation links are currently provided, indicating the need for immediate attention by site administrators.

Potential Impact

For European organizations, especially those operating e-commerce websites on WordPress using the Premmerce User Roles plugin, this vulnerability presents a significant risk. Successful exploitation can lead to unauthorized code execution, compromising the integrity of the website and potentially exposing sensitive customer data or business logic. This can result in reputational damage, financial loss, and regulatory penalties under GDPR due to data breaches. Additionally, attackers could leverage the compromised site as a foothold for further attacks within the network, increasing the scope of impact. Given the plugin’s role in managing user permissions, attackers might escalate privileges or bypass access controls, exacerbating the damage. The lack of required authentication and user interaction increases the likelihood of automated exploitation attempts, raising the urgency for European organizations to act promptly. The threat is particularly critical for sectors with high online transaction volumes and sensitive data, such as retail, finance, and healthcare.

Mitigation Recommendations

1. Monitor official Premmerce channels for patches or updates addressing CVE-2025-60193 and apply them immediately upon release. 2. In the interim, restrict PHP include paths by configuring the server’s open_basedir directive to limit accessible directories, reducing the risk of arbitrary file inclusion. 3. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block LFI attack patterns, such as suspicious URL parameters or directory traversal sequences. 4. Conduct code reviews and audits of the Premmerce User Roles plugin usage to identify and remediate any unsafe dynamic file inclusion practices. 5. Disable or remove the plugin if it is not essential to reduce the attack surface. 6. Implement strict file permissions on the web server to prevent unauthorized file modifications. 7. Monitor web server logs for unusual requests that may indicate exploitation attempts. 8. Educate development and security teams about secure coding practices related to file inclusion and input validation to prevent similar vulnerabilities in custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:34.981Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc809ca26fb4dd2f594cc

Added to database: 11/6/2025, 4:08:41 PM

Last enriched: 11/13/2025, 5:24:43 PM

Last updated: 11/22/2025, 8:06:34 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats