Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64373: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in shinetheme Traveler

0
High
VulnerabilityCVE-2025-64373cvecve-2025-64373
Published: Thu Dec 18 2025 (12/18/2025, 07:22:16 UTC)
Source: CVE Database V5
Vendor/Project: shinetheme
Product: Traveler

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in shinetheme Traveler traveler allows PHP Local File Inclusion.This issue affects Traveler: from n/a through < 3.2.6.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:08:59 UTC

Technical Analysis

CVE-2025-64373 is a Remote File Inclusion (RFI) vulnerability found in the shinetheme Traveler PHP application, versions prior to 3.2.6. The vulnerability arises from improper control over the filename parameter used in PHP's include or require statements, allowing attackers to specify a remote file to be included and executed by the server. This leads to arbitrary code execution in the context of the web server, enabling attackers to compromise confidentiality and integrity of the system. The vulnerability is remotely exploitable over the network without requiring authentication, though it requires user interaction, such as visiting a crafted URL. The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality and integrity, with low attack complexity and no privileges required. While no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of the Traveler product in travel and tourism sectors. The flaw can be exploited to execute malicious PHP code, potentially leading to data theft, website defacement, or pivoting to internal networks. The vulnerability was publicly disclosed on December 18, 2025, and no official patches or mitigations were linked in the provided data, though version 3.2.6 or later presumably addresses the issue.

Potential Impact

For European organizations, especially those in the travel and tourism industry using the shinetheme Traveler product, this vulnerability presents a critical risk. Exploitation can lead to unauthorized disclosure of sensitive customer data, including personal and payment information, damaging privacy compliance obligations such as GDPR. Integrity of web applications and backend systems can be compromised, allowing attackers to alter booking data, manipulate pricing, or inject malicious content affecting customers and partners. Although availability impact is not directly indicated, successful exploitation could facilitate further attacks disrupting services. The reputational damage and potential regulatory penalties from data breaches could be severe. Given the reliance on travel platforms in countries with large tourism economies, the threat could affect a broad range of businesses, from travel agencies to hotel chains. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and high impact necessitate urgent action.

Mitigation Recommendations

Organizations should immediately upgrade the shinetheme Traveler application to version 3.2.6 or later where the vulnerability is fixed. In the absence of an official patch, temporary mitigations include disabling the ability to include remote files in PHP configurations (e.g., setting allow_url_include=Off in php.ini) and enforcing strict input validation and sanitization on all parameters that control file inclusion. Web Application Firewalls (WAFs) should be configured to detect and block suspicious requests attempting remote file inclusion patterns. Regular code audits should be conducted to identify unsafe include/require usage. Network segmentation can limit the impact of a successful exploit. Monitoring logs for unusual file inclusion attempts and anomalous web traffic can provide early detection. Additionally, educating developers and administrators about secure coding practices and the risks of dynamic file inclusion is essential to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:19.708Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0544eb3efac36700adf

Added to database: 12/18/2025, 7:42:12 AM

Last enriched: 1/21/2026, 12:08:59 AM

Last updated: 2/4/2026, 6:35:18 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats