Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64205: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in TieLabs Jannah

0
High
VulnerabilityCVE-2025-64205cvecve-2025-64205
Published: Thu Dec 18 2025 (12/18/2025, 07:22:11 UTC)
Source: CVE Database V5
Vendor/Project: TieLabs
Product: Jannah

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in TieLabs Jannah jannah allows PHP Local File Inclusion.This issue affects Jannah: from n/a through <= 7.6.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:39:56 UTC

Technical Analysis

CVE-2025-64205 is a Remote File Inclusion (RFI) vulnerability found in the TieLabs Jannah PHP program, specifically affecting versions up to 7.6.0. The root cause is improper control over the filename parameter used in PHP include or require statements, which allows an attacker to specify a remote file to be included and executed by the server. This vulnerability enables an unauthenticated attacker to execute arbitrary PHP code remotely by supplying a crafted URL or input that manipulates the include path. The vulnerability is exploitable over the network without any privileges or user interaction, making it highly accessible to attackers. The CVSS v3.1 score of 8.2 reflects a high severity, with a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high confidentiality impact (C:H), but no impact on integrity (I:N) and only a low impact on availability (A:L). Although no known exploits are currently reported in the wild, the nature of RFI vulnerabilities historically leads to rapid exploitation once public disclosure occurs. The vulnerability affects the Jannah product, a PHP-based platform commonly used for content management and web publishing. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate attention from users of the affected versions. The vulnerability could be leveraged to deploy web shells, steal sensitive data, or pivot within the affected network environment.

Potential Impact

For European organizations, exploitation of CVE-2025-64205 could lead to severe confidentiality breaches, including unauthorized access to sensitive customer data, intellectual property, or internal communications. The ability to remotely execute code without authentication significantly increases the risk of full system compromise, data exfiltration, and potential lateral movement within corporate networks. This could disrupt business operations, damage reputation, and lead to regulatory penalties under GDPR if personal data is exposed. Given the widespread use of PHP-based web platforms in Europe, particularly in sectors such as media, publishing, and e-commerce where Jannah might be deployed, the threat is substantial. Additionally, the low availability impact suggests that while denial of service is less likely, the confidentiality risk alone justifies urgent mitigation. The absence of known exploits in the wild currently provides a small window for proactive defense, but the high severity score indicates that attackers will likely develop exploits rapidly after disclosure.

Mitigation Recommendations

Organizations should immediately inventory their web applications to identify any deployments of TieLabs Jannah version 7.6.0 or earlier. Until an official patch is released, implement strict input validation and sanitization on all parameters that influence file inclusion paths to prevent injection of remote URLs. Disable PHP's allow_url_include directive to prevent inclusion of remote files altogether. Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious include/require patterns and remote file inclusion attempts. Monitor web server logs for unusual requests that attempt to exploit file inclusion vulnerabilities. Limit the web server's file system permissions to restrict the execution context and reduce the impact of potential code execution. Once a patch becomes available from TieLabs, prioritize its deployment in all affected environments. Additionally, conduct security awareness training for developers to avoid unsafe coding practices related to file inclusion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:07:04.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0514eb3efac36700a78

Added to database: 12/18/2025, 7:42:09 AM

Last enriched: 1/20/2026, 11:39:56 PM

Last updated: 2/7/2026, 1:08:04 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats