Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60196: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Clearblue Clearblue® Ovulation Calculator

0
High
VulnerabilityCVE-2025-60196cvecve-2025-60196
Published: Thu Nov 06 2025 (11/06/2025, 15:54:52 UTC)
Source: CVE Database V5
Vendor/Project: Clearblue
Product: Clearblue® Ovulation Calculator

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Clearblue Clearblue® Ovulation Calculator clearblue-ovulation-calculator allows PHP Local File Inclusion.This issue affects Clearblue® Ovulation Calculator: from n/a through <= 1.2.4.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:46:55 UTC

Technical Analysis

CVE-2025-60196 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement' in the PHP-based Clearblue® Ovulation Calculator application, versions up to 1.2.4. This vulnerability allows an attacker to exploit the PHP include or require functions improperly controlled by user input, leading to Remote File Inclusion (RFI) or Local File Inclusion (LFI). Through this, an attacker can cause the application to load and execute malicious PHP code from a remote or local source. The vulnerability requires low privileges (PR:L), no user interaction (UI:N), and is exploitable over the network (AV:N), but has a high attack complexity (AC:H), indicating some conditions must be met for successful exploitation. The impact is critical, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing attackers to execute arbitrary code, steal sensitive data, or disrupt service. The Clearblue® Ovulation Calculator is a specialized healthcare-related application used for fertility tracking, which may be deployed in clinical or personal environments. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability's presence in a healthcare-related product raises concerns about patient data confidentiality and system reliability.

Potential Impact

For European organizations, particularly healthcare providers, fertility clinics, and possibly consumers using Clearblue® Ovulation Calculator software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive health data, manipulation or deletion of patient records, and disruption of fertility tracking services. This could undermine patient trust and violate GDPR regulations concerning personal health information. Additionally, compromised systems could be leveraged as footholds for broader network attacks within healthcare institutions, potentially affecting critical infrastructure. The high severity and ease of remote exploitation without user interaction increase the urgency of addressing this threat. Organizations relying on this software must consider the risk of reputational damage, regulatory penalties, and operational downtime.

Mitigation Recommendations

1. Monitor Clearblue vendor communications closely for official patches or updates addressing CVE-2025-60196 and apply them immediately upon release. 2. Until patches are available, implement strict input validation and sanitization on all user-supplied data that may influence file inclusion paths, employing whitelisting of allowed filenames or directories. 3. Configure PHP settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off') and restrict file inclusion paths using 'open_basedir' to limit accessible directories. 4. Conduct thorough code reviews and penetration testing focused on file inclusion mechanisms within the Clearblue Ovulation Calculator deployment. 5. Employ network-level protections such as web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. 6. Isolate the application environment to minimize potential lateral movement if exploitation occurs. 7. Educate IT and security teams about this specific vulnerability to ensure rapid detection and response to any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:34.982Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc809ca26fb4dd2f594d5

Added to database: 11/6/2025, 4:08:41 PM

Last enriched: 1/20/2026, 9:46:55 PM

Last updated: 2/7/2026, 9:54:39 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats