Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62045: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in CodexThemes TheGem Theme Elements (for WPBakery)

0
High
VulnerabilityCVE-2025-62045cvecve-2025-62045
Published: Thu Nov 06 2025 (11/06/2025, 15:55:41 UTC)
Source: CVE Database V5
Vendor/Project: CodexThemes
Product: TheGem Theme Elements (for WPBakery)

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CodexThemes TheGem Theme Elements (for WPBakery) thegem-elements.This issue affects TheGem Theme Elements (for WPBakery): from n/a through <= 5.10.5.1.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:38:41 UTC

Technical Analysis

CVE-2025-62045 is a remote file inclusion vulnerability found in the CodexThemes TheGem Theme Elements plugin for WPBakery, a popular WordPress page builder. The vulnerability stems from improper validation and control of filenames used in PHP include or require statements within the plugin’s code. This flaw allows an attacker with low-level privileges (authenticated user) to supply a crafted filename that points to a remote malicious file. When the plugin includes this remote file, the attacker can execute arbitrary PHP code on the server, leading to a compromise of the confidentiality and integrity of the affected system. The vulnerability affects all versions of TheGem Theme Elements up to and including 5.10.5.1. The CVSS v3.1 base score is 8.1, indicating a high severity due to network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality and integrity. Although no public exploits are currently known, the nature of the vulnerability makes it a critical risk for WordPress sites using this plugin. Attackers could leverage this to deploy web shells, steal sensitive data, or pivot within the network. The vulnerability does not directly impact availability but can indirectly affect service through malicious actions. The issue was reserved in early October 2025 and published in November 2025, with no patch links currently available, indicating that organizations must monitor for updates from CodexThemes and Patchstack. The vulnerability is particularly relevant for websites that rely on TheGem Theme Elements for WPBakery, which is widely used in creative and e-commerce sectors.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress-based websites, especially those using TheGem Theme Elements plugin. Successful exploitation could lead to unauthorized code execution, data breaches involving customer or business data, and potential defacement or takeover of websites. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and cause financial losses. E-commerce platforms and service providers relying on WordPress themes are particularly vulnerable, as attackers may steal payment data or customer information. The requirement for low privilege authentication means insider threats or compromised user accounts can be leveraged. Given the widespread use of WordPress in Europe, the threat surface is substantial. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or to distribute malware to visitors. The lack of current public exploits provides a window for mitigation, but the high CVSS score underscores urgency.

Mitigation Recommendations

1. Monitor CodexThemes and WPBakery official channels for patches addressing CVE-2025-62045 and apply updates immediately upon release. 2. Until patches are available, restrict PHP include paths by configuring PHP settings (e.g., disable allow_url_include) to prevent remote file inclusion. 3. Implement web application firewalls (WAFs) with rules to detect and block suspicious include/require requests or anomalous HTTP parameters. 4. Limit user privileges on WordPress sites to the minimum necessary to reduce the risk of low-privilege authenticated exploitation. 5. Conduct regular security audits and code reviews of custom themes/plugins to identify unsafe file inclusion patterns. 6. Monitor server and application logs for unusual file inclusion attempts or unexpected remote connections. 7. Employ network segmentation to isolate web servers from critical internal systems to limit lateral movement if compromised. 8. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 9. Consider temporary disabling or replacing TheGem Theme Elements plugin if patching is delayed and risk is unacceptable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:34:31.732Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc816ca26fb4dd2f59b4e

Added to database: 11/6/2025, 4:08:54 PM

Last enriched: 11/13/2025, 5:38:41 PM

Last updated: 11/22/2025, 8:12:08 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats