CVE-2025-62010: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ApusTheme Famita
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme Famita famita allows PHP Local File Inclusion.This issue affects Famita: from n/a through <= 1.54.
AI Analysis
Technical Summary
The vulnerability CVE-2025-62010 in ApusTheme Famita arises from improper validation of filenames in PHP include/require statements, enabling local file inclusion. This can be exploited remotely without authentication, as indicated by the CVSS vector (AV:N/AC:H/PR:N/UI:N). The impact includes high confidentiality, integrity, and availability loss. The affected versions include all releases up to and including 1.54. No vendor advisory or patch links are available at this time, and the vulnerability was published on 2025-11-06.
Potential Impact
Successful exploitation allows an unauthenticated remote attacker to include local files on the server, potentially leading to arbitrary code execution, data disclosure, or denial of service. The CVSS score of 8.1 reflects high impact on confidentiality, integrity, and availability. There are no known exploits in the wild as of the publication date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider disabling or removing the affected theme or applying manual code review and hardening to prevent local file inclusion. Monitor the vendor's channels for updates and patches.
CVE-2025-62010: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ApusTheme Famita
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme Famita famita allows PHP Local File Inclusion.This issue affects Famita: from n/a through <= 1.54.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2025-62010 in ApusTheme Famita arises from improper validation of filenames in PHP include/require statements, enabling local file inclusion. This can be exploited remotely without authentication, as indicated by the CVSS vector (AV:N/AC:H/PR:N/UI:N). The impact includes high confidentiality, integrity, and availability loss. The affected versions include all releases up to and including 1.54. No vendor advisory or patch links are available at this time, and the vulnerability was published on 2025-11-06.
Potential Impact
Successful exploitation allows an unauthenticated remote attacker to include local files on the server, potentially leading to arbitrary code execution, data disclosure, or denial of service. The CVSS score of 8.1 reflects high impact on confidentiality, integrity, and availability. There are no known exploits in the wild as of the publication date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider disabling or removing the affected theme or applying manual code review and hardening to prevent local file inclusion. Monitor the vendor's channels for updates and patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-07T15:34:03.910Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690cc810ca26fb4dd2f5969d
Added to database: 11/6/2025, 4:08:48 PM
Last enriched: 4/29/2026, 4:22:12 AM
Last updated: 5/12/2026, 1:01:41 PM
Views: 146
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.