Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63062: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AndonDesign UDesign Core

0
High
VulnerabilityCVE-2025-63062cvecve-2025-63062
Published: Tue Dec 09 2025 (12/09/2025, 14:52:34 UTC)
Source: CVE Database V5
Vendor/Project: AndonDesign
Product: UDesign Core

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AndonDesign UDesign Core u-design-core allows PHP Local File Inclusion.This issue affects UDesign Core: from n/a through <= 4.14.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 06:56:39 UTC

Technical Analysis

CVE-2025-63062 is a vulnerability identified in AndonDesign's UDesign Core product, versions up to and including 4.14.0. The flaw arises from improper control over the filename used in PHP include or require statements, which leads to a Remote File Inclusion (RFI) vulnerability. RFI vulnerabilities allow attackers to include and execute remote malicious PHP code by manipulating input parameters that specify file paths. In this case, the vulnerability permits an attacker with low privileges (PR:L) and requiring user interaction (UI:R) to exploit the flaw remotely over the network (AV:N). The CVSS vector indicates a scope change (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), as attackers can potentially access sensitive data or execute arbitrary code, while integrity impact is low (I:L) and availability is not affected (A:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the ease of exploitation and the potential for remote code execution. The vulnerability is particularly relevant for web applications built on PHP that use UDesign Core for content management or web design, as attackers could leverage this flaw to compromise web servers, steal data, or pivot within the network. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor for suspicious activity.

Potential Impact

For European organizations, the impact of CVE-2025-63062 can be substantial, especially for those relying on UDesign Core in their web infrastructure. Successful exploitation could lead to unauthorized disclosure of sensitive information, including customer data, intellectual property, and internal configuration files, thereby violating GDPR and other data protection regulations. The ability to execute remote code compromises system integrity and may allow attackers to establish persistent footholds, conduct lateral movement, or deploy further malware. Although availability is not directly impacted, the indirect consequences such as data breaches, reputational damage, and regulatory fines can be severe. Organizations in sectors like finance, healthcare, government, and e-commerce, which often deploy PHP-based web solutions, are at higher risk. Additionally, the requirement for user interaction suggests that phishing or social engineering could be used to facilitate exploitation, increasing the attack surface. The vulnerability's presence in a widely used web design core component amplifies the potential scale of impact across multiple European enterprises and public sector entities.

Mitigation Recommendations

1. Monitor AndonDesign's official channels closely for the release of security patches addressing CVE-2025-63062 and apply them promptly once available. 2. Until patches are released, implement strict input validation and sanitization on all parameters that influence file inclusion to prevent injection of malicious paths. 3. Configure PHP settings to disable allow_url_include and allow_url_fopen directives to prevent remote file inclusion via URL. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious include/require requests or payloads indicative of RFI attempts. 5. Restrict file inclusion paths using PHP's open_basedir directive to limit accessible directories and prevent unauthorized file access. 6. Conduct regular code audits and penetration testing focusing on file inclusion mechanisms within UDesign Core integrations. 7. Educate users and administrators about phishing and social engineering risks that could trigger user interaction required for exploitation. 8. Implement network segmentation and least privilege principles to limit the potential spread of an attacker post-exploitation. 9. Enable comprehensive logging and monitoring to detect anomalous file inclusion attempts or unexpected PHP execution patterns. 10. Consider temporary disabling or isolating vulnerable UDesign Core instances if immediate patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:26:38.886Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383acb29cea75c35b76fe9

Added to database: 12/9/2025, 3:05:47 PM

Last enriched: 2/12/2026, 6:56:39 AM

Last updated: 3/23/2026, 11:59:09 PM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses