Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60198: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in dedalx Saxon - Viral Content Blog & Magazine Marketing WordPress Theme

0
High
VulnerabilityCVE-2025-60198cvecve-2025-60198
Published: Thu Nov 06 2025 (11/06/2025, 15:54:55 UTC)
Source: CVE Database V5
Vendor/Project: dedalx
Product: Saxon - Viral Content Blog & Magazine Marketing WordPress Theme

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Saxon - Viral Content Blog & Magazine Marketing WordPress Theme saxon allows PHP Local File Inclusion.This issue affects Saxon - Viral Content Blog & Magazine Marketing WordPress Theme: from n/a through <= 1.9.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/13/2026, 06:46:01 UTC

Technical Analysis

CVE-2025-60198 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly known as a Remote File Inclusion (RFI) vulnerability, found in the dedalx Saxon WordPress theme (versions up to 1.9.3). This vulnerability arises because the theme improperly validates or sanitizes user-supplied input used in PHP include or require statements. As a result, an attacker can manipulate the filename parameter to include remote malicious PHP files hosted on attacker-controlled servers. When the vulnerable PHP script executes the include or require statement, it fetches and runs the attacker's code, leading to remote code execution on the web server. The CVSS v3.1 score of 8.1 reflects a high severity, with the attack vector being network-based (AV:N), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact is critical across confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can fully compromise the system. Although no known exploits are currently reported in the wild, the vulnerability is publicly disclosed and can be weaponized by attackers. The affected product is a WordPress theme used for viral content blogs and magazine marketing, which are common in digital marketing environments. The lack of available patches or updates at the time of disclosure increases the urgency for mitigation. The vulnerability's exploitation can lead to unauthorized access, data theft, defacement, or use of the compromised server as a pivot point for further attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying on the dedalx Saxon theme for their WordPress sites. Successful exploitation can lead to complete system compromise, including theft of sensitive customer data, defacement of websites, disruption of services, and potential use of compromised servers to launch further attacks within the network or against third parties. Given the theme's focus on viral content and marketing, organizations in the digital marketing, media, and publishing sectors are particularly vulnerable. The impact extends beyond the affected website to the organization's reputation and regulatory compliance, especially under GDPR, where data breaches can result in heavy fines. Additionally, compromised servers can be enlisted in botnets or used to distribute malware, amplifying the threat landscape. The high attack complexity somewhat limits exploitation to skilled attackers, but the lack of required privileges or user interaction lowers the barrier significantly. The network attack vector means attackers can attempt exploitation remotely without prior access, increasing exposure. Overall, the threat can disrupt business operations and cause financial and reputational damage.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the use of the dedalx Saxon theme, particularly versions up to 1.9.3. If found, they should seek updates or patches from the vendor; if none are available, consider replacing the theme with a secure alternative. As a critical mitigation, disable PHP's allow_url_include directive to prevent remote file inclusion via URL. Implement strict input validation and sanitization on any user-supplied data used in include or require statements, employing whitelisting of allowed files or paths. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious requests attempting file inclusion attacks. Monitor web server logs for unusual patterns, such as requests containing suspicious parameters or remote URLs. Restrict file permissions on the server to limit the impact of any successful code execution. Conduct regular security scans and penetration tests focusing on file inclusion vulnerabilities. Finally, educate web developers and administrators about secure coding practices to prevent similar vulnerabilities in custom themes or plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:34.982Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc809ca26fb4dd2f594db

Added to database: 11/6/2025, 4:08:41 PM

Last enriched: 2/13/2026, 6:46:01 AM

Last updated: 3/26/2026, 10:07:21 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses