Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60198: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in dedalx Saxon - Viral Content Blog & Magazine Marketing WordPress Theme

0
High
VulnerabilityCVE-2025-60198cvecve-2025-60198
Published: Thu Nov 06 2025 (11/06/2025, 15:54:55 UTC)
Source: CVE Database V5
Vendor/Project: dedalx
Product: Saxon - Viral Content Blog & Magazine Marketing WordPress Theme

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Saxon - Viral Content Blog & Magazine Marketing WordPress Theme saxon allows PHP Local File Inclusion.This issue affects Saxon - Viral Content Blog & Magazine Marketing WordPress Theme: from n/a through <= 1.9.3.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:47:45 UTC

Technical Analysis

CVE-2025-60198 is a vulnerability classified as PHP Remote File Inclusion (RFI) found in the dedalx Saxon WordPress theme, versions up to and including 1.9.3. The root cause is improper control over the filename parameter used in PHP include or require statements, which allows an attacker to specify a remote file to be included and executed by the PHP interpreter. This can lead to remote code execution (RCE), enabling attackers to run arbitrary code on the affected server. The vulnerability does not require any authentication or user interaction, but the attack complexity is high, indicating some conditions or knowledge are necessary to exploit it. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. The vulnerability affects websites using the Saxon theme, commonly deployed for viral content blogs and marketing magazines on WordPress. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved in late September 2025 and published in early November 2025. The theme’s improper input validation or sanitization of the include/require filename parameter is the technical cause, allowing attackers to specify remote URLs or local files to be included, leading to code execution or information disclosure. This type of vulnerability is critical because it can lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.

Potential Impact

For European organizations, the impact of CVE-2025-60198 can be severe, especially for those relying on WordPress sites using the Saxon theme for marketing or content distribution. Successful exploitation can lead to full remote code execution, allowing attackers to steal sensitive data, modify website content, deploy malware, or disrupt services. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data breaches), and cause financial losses. The high severity and no requirement for authentication make it a significant threat to public-facing websites. Organizations in sectors such as media, marketing, e-commerce, and public services that use WordPress extensively are particularly vulnerable. Additionally, compromised websites can be used as platforms for phishing, malware distribution, or launching attacks against other targets, amplifying the threat landscape in Europe.

Mitigation Recommendations

1. Immediately update the Saxon WordPress theme to a patched version once available from the vendor or consider switching to a different, actively maintained theme. 2. If no patch is available, apply manual code review and harden the include/require statements by enforcing strict input validation and sanitization to prevent remote file inclusion. 3. Disable allow_url_include and allow_url_fopen directives in PHP configuration to prevent remote file inclusion. 4. Employ a Web Application Firewall (WAF) with rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities. 5. Restrict file system permissions to limit the web server’s ability to read or execute unauthorized files. 6. Monitor web server logs for unusual requests targeting include parameters or suspicious URL patterns. 7. Conduct regular security audits and vulnerability scans focusing on WordPress themes and plugins. 8. Educate development and IT teams about secure coding practices related to file inclusion and input validation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:34.982Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc809ca26fb4dd2f594db

Added to database: 11/6/2025, 4:08:41 PM

Last enriched: 1/20/2026, 9:47:45 PM

Last updated: 2/7/2026, 10:22:23 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats