CVE-2025-60196: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Clearblue Clearblue® Ovulation Calculator
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Clearblue Clearblue® Ovulation Calculator clearblue-ovulation-calculator allows PHP Local File Inclusion.This issue affects Clearblue® Ovulation Calculator: from n/a through <= 1.2.4.
AI Analysis
Technical Summary
CVE-2025-60196 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement' in the PHP-based Clearblue® Ovulation Calculator application, versions up to 1.2.4. This vulnerability allows an attacker to exploit the PHP include or require functions improperly controlled by user input, leading to Remote File Inclusion (RFI) or Local File Inclusion (LFI). Through this, an attacker can cause the application to load and execute malicious PHP code from a remote or local source. The vulnerability requires low privileges (PR:L), no user interaction (UI:N), and is exploitable over the network (AV:N), but has a high attack complexity (AC:H), indicating some conditions must be met for successful exploitation. The impact is critical, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing attackers to execute arbitrary code, steal sensitive data, or disrupt service. The Clearblue® Ovulation Calculator is a specialized healthcare-related application used for fertility tracking, which may be deployed in clinical or personal environments. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability's presence in a healthcare-related product raises concerns about patient data confidentiality and system reliability.
Potential Impact
For European organizations, particularly healthcare providers, fertility clinics, and possibly consumers using Clearblue® Ovulation Calculator software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive health data, manipulation or deletion of patient records, and disruption of fertility tracking services. This could undermine patient trust and violate GDPR regulations concerning personal health information. Additionally, compromised systems could be leveraged as footholds for broader network attacks within healthcare institutions, potentially affecting critical infrastructure. The high severity and ease of remote exploitation without user interaction increase the urgency of addressing this threat. Organizations relying on this software must consider the risk of reputational damage, regulatory penalties, and operational downtime.
Mitigation Recommendations
1. Monitor Clearblue vendor communications closely for official patches or updates addressing CVE-2025-60196 and apply them immediately upon release. 2. Until patches are available, implement strict input validation and sanitization on all user-supplied data that may influence file inclusion paths, employing whitelisting of allowed filenames or directories. 3. Configure PHP settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off') and restrict file inclusion paths using 'open_basedir' to limit accessible directories. 4. Conduct thorough code reviews and penetration testing focused on file inclusion mechanisms within the Clearblue Ovulation Calculator deployment. 5. Employ network-level protections such as web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. 6. Isolate the application environment to minimize potential lateral movement if exploitation occurs. 7. Educate IT and security teams about this specific vulnerability to ensure rapid detection and response to any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-60196: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Clearblue Clearblue® Ovulation Calculator
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Clearblue Clearblue® Ovulation Calculator clearblue-ovulation-calculator allows PHP Local File Inclusion.This issue affects Clearblue® Ovulation Calculator: from n/a through <= 1.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-60196 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement' in the PHP-based Clearblue® Ovulation Calculator application, versions up to 1.2.4. This vulnerability allows an attacker to exploit the PHP include or require functions improperly controlled by user input, leading to Remote File Inclusion (RFI) or Local File Inclusion (LFI). Through this, an attacker can cause the application to load and execute malicious PHP code from a remote or local source. The vulnerability requires low privileges (PR:L), no user interaction (UI:N), and is exploitable over the network (AV:N), but has a high attack complexity (AC:H), indicating some conditions must be met for successful exploitation. The impact is critical, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing attackers to execute arbitrary code, steal sensitive data, or disrupt service. The Clearblue® Ovulation Calculator is a specialized healthcare-related application used for fertility tracking, which may be deployed in clinical or personal environments. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability's presence in a healthcare-related product raises concerns about patient data confidentiality and system reliability.
Potential Impact
For European organizations, particularly healthcare providers, fertility clinics, and possibly consumers using Clearblue® Ovulation Calculator software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive health data, manipulation or deletion of patient records, and disruption of fertility tracking services. This could undermine patient trust and violate GDPR regulations concerning personal health information. Additionally, compromised systems could be leveraged as footholds for broader network attacks within healthcare institutions, potentially affecting critical infrastructure. The high severity and ease of remote exploitation without user interaction increase the urgency of addressing this threat. Organizations relying on this software must consider the risk of reputational damage, regulatory penalties, and operational downtime.
Mitigation Recommendations
1. Monitor Clearblue vendor communications closely for official patches or updates addressing CVE-2025-60196 and apply them immediately upon release. 2. Until patches are available, implement strict input validation and sanitization on all user-supplied data that may influence file inclusion paths, employing whitelisting of allowed filenames or directories. 3. Configure PHP settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off') and restrict file inclusion paths using 'open_basedir' to limit accessible directories. 4. Conduct thorough code reviews and penetration testing focused on file inclusion mechanisms within the Clearblue Ovulation Calculator deployment. 5. Employ network-level protections such as web application firewalls (WAFs) with rules to detect and block suspicious file inclusion attempts. 6. Isolate the application environment to minimize potential lateral movement if exploitation occurs. 7. Educate IT and security teams about this specific vulnerability to ensure rapid detection and response to any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:34.982Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690cc809ca26fb4dd2f594d5
Added to database: 11/6/2025, 4:08:41 PM
Last enriched: 1/20/2026, 9:46:55 PM
Last updated: 2/7/2026, 9:54:39 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.