Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64363: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in SeventhQueen Kleo

0
High
VulnerabilityCVE-2025-64363cvecve-2025-64363
Published: Fri Oct 31 2025 (10/31/2025, 11:42:37 UTC)
Source: CVE Database V5
Vendor/Project: SeventhQueen
Product: Kleo

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in SeventhQueen Kleo kleo allows PHP Local File Inclusion.This issue affects Kleo: from n/a through < 5.5.0.

AI-Powered Analysis

AILast updated: 11/15/2025, 04:33:21 UTC

Technical Analysis

CVE-2025-64363 is a vulnerability identified in the SeventhQueen Kleo PHP program, specifically involving improper control over filenames used in include or require statements. This flaw allows an attacker to perform Remote File Inclusion (RFI) or Local File Inclusion (LFI), enabling them to inject and execute arbitrary PHP code on the affected server. The vulnerability affects all Kleo versions prior to 5.5.0. The root cause is insufficient validation or sanitization of user-supplied input that determines the filename for inclusion, allowing attackers to specify malicious files hosted remotely or locally. Exploiting this vulnerability requires network access and low privileges but does not require user interaction, making it easier to exploit remotely. The CVSS v3.1 score of 7.5 reflects high impact on confidentiality, integrity, and availability, with attack complexity rated as high due to some required conditions but no authentication needed. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because successful exploitation can lead to full system compromise, data theft, or service disruption. The vulnerability is categorized under improper control of file inclusion in PHP applications, a common and dangerous web application security issue. The lack of available patches at the time of reporting emphasizes the need for immediate mitigation steps by affected users.

Potential Impact

For European organizations, this vulnerability poses a critical risk to web applications running the Kleo product, particularly those that have not upgraded to version 5.5.0 or later. Successful exploitation can lead to remote code execution, allowing attackers to gain unauthorized access to sensitive data, modify or delete information, and disrupt service availability. This can result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. Organizations operating critical infrastructure or handling sensitive personal or financial data are especially vulnerable. The attack vector being network accessible and requiring only low privileges increases the likelihood of exploitation in exposed environments. The absence of known exploits in the wild currently provides a window for proactive defense, but the high severity score indicates that once exploits emerge, the impact could be severe. European entities with public-facing web services using Kleo are at heightened risk, and the threat landscape may evolve rapidly given the commonality of PHP-based applications in the region.

Mitigation Recommendations

1. Immediately upgrade all instances of SeventhQueen Kleo to version 5.5.0 or later once available, as this version addresses the vulnerability. 2. Until patching is possible, implement strict input validation and sanitization on all parameters controlling file inclusion to prevent injection of malicious paths. 3. Employ web application firewalls (WAFs) with rules specifically designed to detect and block attempts to exploit file inclusion vulnerabilities. 4. Restrict PHP include paths to trusted directories only, using configuration directives such as open_basedir to limit file system access. 5. Conduct thorough code reviews and security testing focusing on file inclusion logic to identify and remediate similar issues. 6. Monitor logs for suspicious requests that attempt to manipulate include parameters or access unexpected files. 7. Isolate vulnerable applications in segmented network zones to limit potential lateral movement in case of compromise. 8. Educate development and operations teams about secure coding practices related to file inclusion and input handling. 9. Prepare incident response plans to quickly address potential exploitation attempts. 10. Engage with SeventhQueen support or security advisories to stay informed about patches and mitigation updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:15.210Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6904a350479ed964d8ea1f04

Added to database: 10/31/2025, 11:53:52 AM

Last enriched: 11/15/2025, 4:33:21 AM

Last updated: 12/14/2025, 9:59:16 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats