Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64364: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in StylemixThemes Masterstudy

0
High
VulnerabilityCVE-2025-64364cvecve-2025-64364
Published: Fri Oct 31 2025 (10/31/2025, 11:42:37 UTC)
Source: CVE Database V5
Vendor/Project: StylemixThemes
Product: Masterstudy

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Masterstudy masterstudy allows PHP Local File Inclusion.This issue affects Masterstudy: from n/a through < 4.8.126.

AI-Powered Analysis

AILast updated: 11/15/2025, 04:33:32 UTC

Technical Analysis

CVE-2025-64364 is a vulnerability in the StylemixThemes Masterstudy WordPress plugin, specifically in versions before 4.8.126. The flaw arises from improper control over the filename used in PHP include or require statements, which can lead to Remote File Inclusion (RFI) or Local File Inclusion (LFI). This means an attacker can manipulate input parameters to cause the application to include and execute malicious PHP code from remote or local sources. The vulnerability is exploitable over the network (AV:N), requires low privileges (PR:L), has high attack complexity (AC:H), and does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), as attackers can execute arbitrary code, potentially leading to full system compromise, data theft, defacement, or denial of service. The vulnerability affects educational websites using the Masterstudy plugin, which is popular for e-learning platforms built on WordPress. Although no public exploits are currently known, the nature of the vulnerability and its CVSS score of 7.5 indicate a serious risk. The lack of available patches at the time of disclosure means organizations must apply mitigations promptly once updates are released. The vulnerability is documented and published by Patchstack and the CVE database, emphasizing the need for awareness and remediation.

Potential Impact

European organizations using the StylemixThemes Masterstudy plugin for their e-learning or educational websites face significant risks from this vulnerability. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to access sensitive student or organizational data, alter course content, or disrupt service availability. This could result in data breaches violating GDPR regulations, reputational damage, and operational downtime. Educational institutions and training providers are particularly vulnerable due to their reliance on these platforms for delivering critical services. The high integrity and availability impact could disrupt learning activities and cause financial losses. Furthermore, attackers could leverage compromised systems as footholds for lateral movement within organizational networks. The vulnerability's network accessibility and low privilege requirement increase the likelihood of exploitation in the wild once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately monitor for updates from StylemixThemes and apply the patch for Masterstudy plugin version 4.8.126 or later as soon as it is released. Until patches are available, administrators should restrict file inclusion paths by configuring PHP settings such as open_basedir to limit accessible directories. Input validation and sanitization must be enforced on all parameters that influence file inclusion to prevent injection of malicious paths. Employing Web Application Firewalls (WAFs) with rules targeting suspicious file inclusion attempts can provide temporary protection. Regularly audit plugin usage and remove or replace plugins that are no longer maintained or pose security risks. Additionally, implement strict access controls and network segmentation to limit the impact of potential compromises. Monitoring logs for unusual file inclusion or code execution patterns can help detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:15.210Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6904a350479ed964d8ea1f07

Added to database: 10/31/2025, 11:53:52 AM

Last enriched: 11/15/2025, 4:33:32 AM

Last updated: 12/15/2025, 10:09:32 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats