CVE-2025-62067: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Elated-Themes Savory
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Savory savory.This issue affects Savory: from n/a through <= 2.5.
AI Analysis
Technical Summary
CVE-2025-62067 is a remote file inclusion (RFI) vulnerability found in the Elated-Themes Savory WordPress theme, affecting versions up to and including 2.5. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, which allows an attacker to specify a remote file to be included and executed by the server. This type of vulnerability is critical because it enables remote code execution without requiring authentication or user interaction, as indicated by the CVSS vector (AV:A/AC:L/PR:N/UI:N). The attack vector is adjacent network, meaning the attacker must have network access to the vulnerable server, such as through the internet or internal network. Successful exploitation compromises confidentiality and integrity by allowing arbitrary code execution, potentially leading to website defacement, data theft, or pivoting to other internal systems. The vulnerability was published on November 6, 2025, with a high CVSS score of 8.1, reflecting its severity. No known exploits are currently reported in the wild, but the nature of RFI vulnerabilities historically makes them attractive targets for attackers. The lack of available patches at the time of publication suggests that users of the Savory theme should be vigilant and apply updates as soon as they are released. The vulnerability is particularly relevant for WordPress sites using the Savory theme, which is popular among small to medium-sized businesses and content creators. The improper input validation or sanitization in the theme's PHP code is the root cause, allowing external URLs to be included and executed.
Potential Impact
For European organizations, the impact of CVE-2025-62067 can be substantial, especially for those relying on WordPress sites with the Savory theme for business operations, e-commerce, or content delivery. Exploitation could lead to unauthorized disclosure of sensitive customer or corporate data, defacement of websites, loss of customer trust, and potential regulatory penalties under GDPR due to data breaches. The integrity of the web server and hosted applications can be compromised, enabling attackers to deploy malware, ransomware, or use the server as a pivot point for further network intrusion. Availability impact is rated low as the vulnerability does not directly cause denial of service, but indirect effects such as cleanup and downtime after compromise can affect service continuity. Given the high adoption of WordPress in Europe and the popularity of themes like Savory, the risk is amplified. Organizations in sectors such as finance, healthcare, media, and e-commerce are particularly vulnerable due to the sensitive nature of their data and the criticality of their online presence. Additionally, attackers could leverage this vulnerability to conduct espionage or sabotage in the context of geopolitical tensions affecting Europe.
Mitigation Recommendations
1. Immediate action should be to identify all WordPress installations using the Elated-Themes Savory theme, especially versions up to 2.5, through vulnerability scanning and inventory management. 2. Apply official patches or update the Savory theme to a version that addresses the vulnerability as soon as they become available from the vendor. 3. Until patches are released, restrict network access to the affected web servers by implementing IP whitelisting or geo-blocking to limit exposure to untrusted networks. 4. Deploy Web Application Firewalls (WAFs) with rules specifically targeting remote file inclusion attempts, including blocking suspicious URL parameters and external file inclusion patterns. 5. Harden PHP configurations by disabling allow_url_include and allow_url_fopen directives to prevent remote file inclusion via PHP. 6. Conduct code reviews and implement input validation and sanitization for any custom PHP code or themes/plugins to prevent similar vulnerabilities. 7. Monitor web server logs and intrusion detection systems for signs of exploitation attempts, such as unusual requests containing remote URLs or unexpected file inclusions. 8. Educate site administrators on the risks of using outdated themes and plugins and enforce timely updates as part of security policies. 9. Consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential compromises. 10. Regularly backup website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-62067: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Elated-Themes Savory
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Savory savory.This issue affects Savory: from n/a through <= 2.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-62067 is a remote file inclusion (RFI) vulnerability found in the Elated-Themes Savory WordPress theme, affecting versions up to and including 2.5. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, which allows an attacker to specify a remote file to be included and executed by the server. This type of vulnerability is critical because it enables remote code execution without requiring authentication or user interaction, as indicated by the CVSS vector (AV:A/AC:L/PR:N/UI:N). The attack vector is adjacent network, meaning the attacker must have network access to the vulnerable server, such as through the internet or internal network. Successful exploitation compromises confidentiality and integrity by allowing arbitrary code execution, potentially leading to website defacement, data theft, or pivoting to other internal systems. The vulnerability was published on November 6, 2025, with a high CVSS score of 8.1, reflecting its severity. No known exploits are currently reported in the wild, but the nature of RFI vulnerabilities historically makes them attractive targets for attackers. The lack of available patches at the time of publication suggests that users of the Savory theme should be vigilant and apply updates as soon as they are released. The vulnerability is particularly relevant for WordPress sites using the Savory theme, which is popular among small to medium-sized businesses and content creators. The improper input validation or sanitization in the theme's PHP code is the root cause, allowing external URLs to be included and executed.
Potential Impact
For European organizations, the impact of CVE-2025-62067 can be substantial, especially for those relying on WordPress sites with the Savory theme for business operations, e-commerce, or content delivery. Exploitation could lead to unauthorized disclosure of sensitive customer or corporate data, defacement of websites, loss of customer trust, and potential regulatory penalties under GDPR due to data breaches. The integrity of the web server and hosted applications can be compromised, enabling attackers to deploy malware, ransomware, or use the server as a pivot point for further network intrusion. Availability impact is rated low as the vulnerability does not directly cause denial of service, but indirect effects such as cleanup and downtime after compromise can affect service continuity. Given the high adoption of WordPress in Europe and the popularity of themes like Savory, the risk is amplified. Organizations in sectors such as finance, healthcare, media, and e-commerce are particularly vulnerable due to the sensitive nature of their data and the criticality of their online presence. Additionally, attackers could leverage this vulnerability to conduct espionage or sabotage in the context of geopolitical tensions affecting Europe.
Mitigation Recommendations
1. Immediate action should be to identify all WordPress installations using the Elated-Themes Savory theme, especially versions up to 2.5, through vulnerability scanning and inventory management. 2. Apply official patches or update the Savory theme to a version that addresses the vulnerability as soon as they become available from the vendor. 3. Until patches are released, restrict network access to the affected web servers by implementing IP whitelisting or geo-blocking to limit exposure to untrusted networks. 4. Deploy Web Application Firewalls (WAFs) with rules specifically targeting remote file inclusion attempts, including blocking suspicious URL parameters and external file inclusion patterns. 5. Harden PHP configurations by disabling allow_url_include and allow_url_fopen directives to prevent remote file inclusion via PHP. 6. Conduct code reviews and implement input validation and sanitization for any custom PHP code or themes/plugins to prevent similar vulnerabilities. 7. Monitor web server logs and intrusion detection systems for signs of exploitation attempts, such as unusual requests containing remote URLs or unexpected file inclusions. 8. Educate site administrators on the risks of using outdated themes and plugins and enforce timely updates as part of security policies. 9. Consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential compromises. 10. Regularly backup website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-07T15:34:44.824Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690cc81aca26fb4dd2f59c2b
Added to database: 11/6/2025, 4:08:58 PM
Last enriched: 1/20/2026, 10:15:18 PM
Last updated: 2/7/2026, 9:17:05 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.