CVE-2025-60193: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Premmerce Premmerce User Roles
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce User Roles premmerce-user-roles allows PHP Local File Inclusion.This issue affects Premmerce User Roles: from n/a through <= 1.0.13.
AI Analysis
Technical Summary
CVE-2025-60193 identifies a vulnerability in the Premmerce User Roles plugin for WordPress, specifically versions up to 1.0.13, where improper control of filenames used in PHP include or require statements leads to a Local File Inclusion (LFI) vulnerability. LFI vulnerabilities allow attackers to trick the application into including files from the local filesystem, which can lead to arbitrary code execution, privilege escalation, or sensitive data disclosure. The vulnerability arises because the plugin does not adequately validate or sanitize user-supplied input that determines which files are included in PHP scripts. According to the CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), the attack can be performed remotely over the network without any authentication or user interaction, has low attack complexity, and impacts the integrity of the system by allowing modification or execution of unintended code. The vulnerability does not affect confidentiality or availability directly but compromises the integrity of the system, which can lead to further exploitation. No known exploits are currently reported in the wild, but the high CVSS score of 7.5 reflects the serious risk posed by this flaw. The vulnerability was reserved in late September 2025 and published in early November 2025, indicating recent discovery. Premmerce User Roles is a plugin used to manage user roles and permissions in WordPress, often deployed in e-commerce or membership sites, making it a valuable target for attackers seeking to escalate privileges or execute malicious code.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of WordPress-based websites, particularly those using the Premmerce User Roles plugin for managing user permissions. Exploitation could allow attackers to execute arbitrary PHP code, potentially leading to website defacement, data tampering, or further compromise of backend systems. This is especially critical for e-commerce platforms, membership sites, or any service relying on WordPress for critical business functions. The lack of required authentication and user interaction means attackers can exploit this remotely and silently, increasing the risk of widespread attacks. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or to distribute malware to customers. The impact on availability and confidentiality is indirect but possible if attackers leverage the integrity breach to deploy ransomware or exfiltrate sensitive data. Given the widespread use of WordPress across Europe, the vulnerability could affect a large number of organizations, particularly those slow to apply updates or lacking robust web application security controls.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the use of the Premmerce User Roles plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or removing the plugin if feasible. If patching is not immediately possible, manual mitigation involves reviewing and hardening the plugin’s code to ensure all inputs controlling include/require statements are strictly validated and sanitized, ideally allowing only predefined safe filenames. Web application firewalls (WAFs) should be configured to detect and block attempts to exploit file inclusion vulnerabilities, such as requests containing directory traversal sequences or suspicious parameters. Monitoring web server and application logs for unusual file inclusion attempts is critical for early detection. Additionally, organizations should enforce the principle of least privilege on web server file permissions to limit the impact of any successful exploitation. Regular backups and incident response plans should be updated to prepare for potential compromise scenarios. Finally, educating development and security teams about secure coding practices related to file inclusion can prevent similar issues in the future.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-60193: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Premmerce Premmerce User Roles
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce User Roles premmerce-user-roles allows PHP Local File Inclusion.This issue affects Premmerce User Roles: from n/a through <= 1.0.13.
AI-Powered Analysis
Technical Analysis
CVE-2025-60193 identifies a vulnerability in the Premmerce User Roles plugin for WordPress, specifically versions up to 1.0.13, where improper control of filenames used in PHP include or require statements leads to a Local File Inclusion (LFI) vulnerability. LFI vulnerabilities allow attackers to trick the application into including files from the local filesystem, which can lead to arbitrary code execution, privilege escalation, or sensitive data disclosure. The vulnerability arises because the plugin does not adequately validate or sanitize user-supplied input that determines which files are included in PHP scripts. According to the CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), the attack can be performed remotely over the network without any authentication or user interaction, has low attack complexity, and impacts the integrity of the system by allowing modification or execution of unintended code. The vulnerability does not affect confidentiality or availability directly but compromises the integrity of the system, which can lead to further exploitation. No known exploits are currently reported in the wild, but the high CVSS score of 7.5 reflects the serious risk posed by this flaw. The vulnerability was reserved in late September 2025 and published in early November 2025, indicating recent discovery. Premmerce User Roles is a plugin used to manage user roles and permissions in WordPress, often deployed in e-commerce or membership sites, making it a valuable target for attackers seeking to escalate privileges or execute malicious code.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of WordPress-based websites, particularly those using the Premmerce User Roles plugin for managing user permissions. Exploitation could allow attackers to execute arbitrary PHP code, potentially leading to website defacement, data tampering, or further compromise of backend systems. This is especially critical for e-commerce platforms, membership sites, or any service relying on WordPress for critical business functions. The lack of required authentication and user interaction means attackers can exploit this remotely and silently, increasing the risk of widespread attacks. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or to distribute malware to customers. The impact on availability and confidentiality is indirect but possible if attackers leverage the integrity breach to deploy ransomware or exfiltrate sensitive data. Given the widespread use of WordPress across Europe, the vulnerability could affect a large number of organizations, particularly those slow to apply updates or lacking robust web application security controls.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the use of the Premmerce User Roles plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or removing the plugin if feasible. If patching is not immediately possible, manual mitigation involves reviewing and hardening the plugin’s code to ensure all inputs controlling include/require statements are strictly validated and sanitized, ideally allowing only predefined safe filenames. Web application firewalls (WAFs) should be configured to detect and block attempts to exploit file inclusion vulnerabilities, such as requests containing directory traversal sequences or suspicious parameters. Monitoring web server and application logs for unusual file inclusion attempts is critical for early detection. Additionally, organizations should enforce the principle of least privilege on web server file permissions to limit the impact of any successful exploitation. Regular backups and incident response plans should be updated to prepare for potential compromise scenarios. Finally, educating development and security teams about secure coding practices related to file inclusion can prevent similar issues in the future.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:34.981Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690cc809ca26fb4dd2f594cc
Added to database: 11/6/2025, 4:08:41 PM
Last enriched: 1/20/2026, 9:46:09 PM
Last updated: 2/5/2026, 6:50:23 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls
HighCVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html
HighCVE-2025-47911: CWE-400: Uncontrolled Resource Consumption in golang.org/x/net golang.org/x/net/html
HighCVE-2025-15557: CWE-295 Improper Certificate Validation in TP-Link Systems Inc. Tapo H100 v1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.