Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63062: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AndonDesign UDesign Core

0
High
VulnerabilityCVE-2025-63062cvecve-2025-63062
Published: Tue Dec 09 2025 (12/09/2025, 14:52:34 UTC)
Source: CVE Database V5
Vendor/Project: AndonDesign
Product: UDesign Core

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AndonDesign UDesign Core u-design-core allows PHP Local File Inclusion.This issue affects UDesign Core: from n/a through <= 4.14.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:30:08 UTC

Technical Analysis

CVE-2025-63062 is a vulnerability identified in the AndonDesign UDesign Core product, specifically affecting versions up to and including 4.14.0. The flaw arises from improper control over the filename parameter used in PHP include or require statements, which can lead to Remote File Inclusion (RFI). This vulnerability allows an attacker to manipulate the filename input to include malicious remote files, potentially leading to remote code execution within the context of the web server. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and low privileges (PR:L), but does require user interaction (UI:R), such as tricking a user or administrator into triggering the exploit. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), allowing attackers to access sensitive data, while integrity impact is low (I:L), and availability is not affected (A:N). Although no known exploits are currently in the wild, the vulnerability's characteristics and CVSS score of 7.6 classify it as high severity. The vulnerability is particularly dangerous because PHP RFI can lead to full system compromise if exploited successfully. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability affects web applications built on UDesign Core, a PHP-based framework used for website design and content management, which is commonly deployed in various industries.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web applications using the UDesign Core framework. Successful exploitation can lead to unauthorized disclosure of sensitive data, including user credentials, business information, and internal configuration files, severely impacting confidentiality. The partial integrity impact could allow attackers to inject malicious code or alter application behavior, potentially facilitating further attacks or data manipulation. Although availability is not directly impacted, the resulting compromise could lead to service disruptions or reputational damage. Given the widespread use of PHP-based CMS and e-commerce platforms in Europe, especially in countries with strong digital economies like Germany, France, and the UK, the threat could affect a broad range of sectors including finance, retail, and public services. The requirement for low privileges and user interaction means that phishing or social engineering could be used to facilitate exploitation, increasing the attack surface. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of addressing the vulnerability before it is weaponized.

Mitigation Recommendations

1. Monitor AndonDesign’s official channels for patches addressing CVE-2025-63062 and apply updates immediately upon release. 2. Until patches are available, implement strict input validation and sanitization on all parameters that influence file inclusion, ensuring only expected and safe filenames are accepted. 3. Disable PHP’s allow_url_include directive in php.ini to prevent remote file inclusion, and ensure allow_url_fopen is disabled if not required. 4. Employ Web Application Firewalls (WAFs) configured to detect and block suspicious file inclusion attempts and anomalous HTTP requests targeting vulnerable endpoints. 5. Restrict file permissions on web server directories to limit the impact of any file inclusion attempts. 6. Conduct regular security audits and code reviews focusing on dynamic file inclusion patterns in PHP code. 7. Educate administrators and users about phishing and social engineering risks that could facilitate exploitation requiring user interaction. 8. Implement logging and monitoring to detect unusual file access or inclusion activities promptly. 9. Consider isolating critical web applications in segmented network zones to reduce lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:26:38.886Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383acb29cea75c35b76fe9

Added to database: 12/9/2025, 3:05:47 PM

Last enriched: 1/20/2026, 11:30:08 PM

Last updated: 2/6/2026, 4:01:41 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats