Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64287: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Edge-Themes Alloggio - Hotel Booking

0
High
VulnerabilityCVE-2025-64287cvecve-2025-64287
Published: Thu Nov 06 2025 (11/06/2025, 15:56:13 UTC)
Source: CVE Database V5
Vendor/Project: Edge-Themes
Product: Alloggio - Hotel Booking

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Edge-Themes Alloggio - Hotel Booking alloggio allows PHP Local File Inclusion.This issue affects Alloggio - Hotel Booking: from n/a through <= 1.8.

AI-Powered Analysis

AILast updated: 11/06/2025, 16:17:33 UTC

Technical Analysis

CVE-2025-64287 is a vulnerability classified as improper control of filename for include/require statements in the PHP program within the Edge-Themes Alloggio - Hotel Booking product. This vulnerability allows for Remote File Inclusion (RFI) or Local File Inclusion (LFI), where an attacker can manipulate the filename parameter used in PHP's include or require functions to load arbitrary files. The affected versions include all releases up to and including version 1.8. The root cause is insufficient validation or sanitization of user-supplied input that controls the file path, enabling attackers to specify remote URLs or local file paths. Successful exploitation can lead to execution of malicious PHP code, disclosure of sensitive files, or complete takeover of the web server hosting the application. Although no known exploits have been reported in the wild, the vulnerability is publicly disclosed and poses a significant risk due to the common use of PHP and the popularity of the Alloggio theme in hotel booking websites. The vulnerability was reserved and published in late 2025, but no official patch or CVSS score is currently available. The lack of a patch increases the urgency for organizations to implement interim mitigations.

Potential Impact

For European organizations, especially those in the hospitality and tourism sectors using the Alloggio theme or similar PHP-based booking platforms, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized remote code execution, allowing attackers to deface websites, steal customer data including personal and payment information, or use compromised servers as a foothold for further attacks within the network. This can result in reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Given the critical nature of online booking systems for revenue generation, downtime or data compromise could have severe financial consequences. Additionally, the vulnerability could be leveraged to distribute malware or ransomware, amplifying the impact. The absence of known exploits currently provides a window for proactive defense, but the public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

Immediate mitigation steps include disabling allow_url_include in the PHP configuration to prevent remote file inclusion. Organizations should audit and sanitize all user inputs that influence file inclusion paths, implementing strict whitelisting of allowable files. Employing web application firewalls (WAFs) with rules targeting RFI/LFI patterns can help detect and block exploitation attempts. Until an official patch is released by Edge-Themes, consider isolating the affected application in a segmented network zone with limited privileges. Regularly monitor logs for suspicious requests containing directory traversal or URL parameters in include statements. If possible, replace or upgrade the Alloggio theme to a version confirmed to be free of this vulnerability. Conduct penetration testing focused on file inclusion vectors to validate the effectiveness of mitigations. Finally, maintain up-to-date backups and incident response plans to minimize damage in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:29:08.850Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc81eca26fb4dd2f59cf4

Added to database: 11/6/2025, 4:09:02 PM

Last enriched: 11/6/2025, 4:17:33 PM

Last updated: 11/6/2025, 5:29:02 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats