Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67615: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in bslthemes Myour

0
High
VulnerabilityCVE-2025-67615cvecve-2025-67615
Published: Thu Jan 22 2026 (01/22/2026, 16:51:51 UTC)
Source: CVE Database V5
Vendor/Project: bslthemes
Product: Myour

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in bslthemes Myour myour allows PHP Local File Inclusion.This issue affects Myour: from n/a through <= 1.5.1.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:31:49 UTC

Technical Analysis

CVE-2025-67615 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement' in the PHP-based bslthemes Myour product, specifically affecting versions up to 1.5.1. This vulnerability is a form of Remote File Inclusion (RFI), where the application fails to properly validate or sanitize user-supplied input used in PHP include or require statements. As a result, an attacker can supply a crafted filename or URL that causes the server to include and execute malicious remote code. The vulnerability does not require authentication or user interaction, and the attack vector is network-based, making it remotely exploitable. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with a high attack complexity but no privileges or user interaction needed. Although no public exploits are currently known, the potential for remote code execution makes this a critical risk. The vulnerability affects web servers running the Myour theme, which is used in PHP environments, often in CMS or e-commerce contexts. The lack of patches or official fixes at the time of publication increases the urgency for mitigation. The vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant threat to web applications using the Myour theme, potentially leading to remote code execution, data breaches, defacement, or denial of service. Confidentiality is at risk as attackers can execute arbitrary code to access sensitive data. Integrity can be compromised through unauthorized modification of files or databases. Availability may be affected if attackers disrupt services or deploy ransomware. Organizations relying on PHP-based CMS or e-commerce platforms that integrate Myour themes are particularly vulnerable. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR), and financial losses. Given the remote exploitability and lack of required privileges, attackers can target vulnerable systems en masse, increasing the risk of widespread compromise across European web infrastructure.

Mitigation Recommendations

Immediate mitigation steps include: 1) Applying any available patches or updates from bslthemes for Myour; 2) If patches are unavailable, disable remote file inclusion in PHP by setting 'allow_url_include=Off' and 'allow_url_fopen=Off' in php.ini; 3) Implement strict input validation and sanitization on all user inputs that influence include/require statements, employing whitelisting of allowed filenames; 4) Employ web application firewalls (WAFs) configured to detect and block suspicious file inclusion attempts; 5) Conduct thorough code reviews and audits of PHP applications using Myour to identify and remediate unsafe include patterns; 6) Monitor logs for unusual requests or errors indicative of exploitation attempts; 7) Isolate vulnerable web servers and restrict network access where possible; 8) Educate developers and administrators about secure coding practices related to file inclusion. These measures go beyond generic advice by focusing on configuration hardening, proactive detection, and code-level remediation specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T16:46:41.863Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259134623b1157c7fae21

Added to database: 1/22/2026, 5:06:27 PM

Last enriched: 1/30/2026, 8:31:49 AM

Last updated: 2/5/2026, 4:56:47 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats