Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67616: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in BZOTheme Mella

0
High
VulnerabilityCVE-2025-67616cvecve-2025-67616
Published: Thu Jan 22 2026 (01/22/2026, 16:51:51 UTC)
Source: CVE Database V5
Vendor/Project: BZOTheme
Product: Mella

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BZOTheme Mella mella allows PHP Local File Inclusion.This issue affects Mella: from n/a through <= 1.2.29.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:32:01 UTC

Technical Analysis

CVE-2025-67616 is a remote file inclusion (RFI) vulnerability found in the BZOTheme Mella WordPress theme versions up to 1.2.29. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements. Specifically, the theme fails to properly validate or sanitize user-supplied input that determines which files are included during execution. This flaw enables an attacker to supply a remote URL or malicious file path, causing the server to fetch and execute arbitrary PHP code from an external source. The vulnerability does not require any authentication or user interaction, making it exploitable remotely by any attacker with network access to the vulnerable web server. The CVSS v3.1 base score of 8.1 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise, data leakage, or denial of service. Although no public exploits have been reported yet, the nature of RFI vulnerabilities and their prevalence in WordPress themes make this a critical issue to address. The vulnerability affects all installations using the Mella theme up to version 1.2.29, which is popular among WordPress users for e-commerce and business websites. The lack of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation through alternative means such as disabling vulnerable features or applying custom code patches.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites running the Mella theme, potentially leading to unauthorized remote code execution. Attackers could leverage this flaw to deface websites, steal sensitive customer or business data, implant malware, or use compromised servers as pivot points for further network intrusion. This can result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions. E-commerce sites and business portals using Mella are particularly at risk, as attackers may target payment processing or customer databases. The vulnerability’s remote and unauthenticated nature increases the likelihood of exploitation, especially in environments with poor security monitoring or outdated WordPress installations. Given the widespread use of WordPress across Europe, the impact could be broad, affecting small and medium enterprises as well as larger organizations relying on this theme for their online presence.

Mitigation Recommendations

Immediate mitigation should focus on identifying all WordPress installations using the Mella theme version 1.2.29 or earlier. Organizations should monitor for any suspicious web requests or unexpected file inclusions in server logs. Until an official patch is released, administrators can mitigate risk by disabling or removing the vulnerable include/require functionality if feasible, or by implementing strict input validation and sanitization on parameters controlling file inclusion. Employing web application firewalls (WAFs) with rules blocking remote file inclusion attempts can provide additional protection. Regularly updating WordPress core, themes, and plugins remains critical. Organizations should also conduct thorough security audits to detect any signs of compromise and ensure backups are current and tested. Educating developers and administrators about secure coding practices related to file inclusion can prevent similar vulnerabilities in custom themes or plugins.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T16:46:41.863Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259134623b1157c7fae24

Added to database: 1/22/2026, 5:06:27 PM

Last enriched: 1/30/2026, 8:32:01 AM

Last updated: 2/7/2026, 8:33:17 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats