Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67934: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Mikado-Themes Wellspring

0
High
VulnerabilityCVE-2025-67934cvecve-2025-67934
Published: Thu Jan 08 2026 (01/08/2026, 09:17:49 UTC)
Source: CVE Database V5
Vendor/Project: Mikado-Themes
Product: Wellspring

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Wellspring wellspring allows PHP Local File Inclusion.This issue affects Wellspring: from n/a through < 2.8.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:12:32 UTC

Technical Analysis

CVE-2025-67934 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' specifically a Remote File Inclusion (RFI) issue found in Mikado-Themes Wellspring versions prior to 2.8. The vulnerability arises because the application fails to properly validate or sanitize user-supplied input used in PHP include or require statements. This allows an attacker to manipulate the filename parameter to include a remote malicious PHP file hosted on an attacker-controlled server. When the vulnerable application processes this input, it executes the remote code within the context of the web server, leading to arbitrary code execution. The CVSS v3.1 score of 8.1 reflects the network vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact on confidentiality and integrity is high, as attackers can execute arbitrary code and potentially access sensitive data or modify application behavior. Availability is not impacted. Although no known exploits are currently in the wild, the vulnerability is critical due to the ease of exploitation and the potential damage. The vulnerability affects PHP-based websites using the Wellspring theme, which is popular among WordPress users. No official patches or mitigation links are currently published, indicating the need for immediate defensive measures by users.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Mikado-Themes Wellspring for their web presence. Successful exploitation can lead to unauthorized code execution, data theft, website defacement, or use of the compromised server as a pivot point for further attacks. This can result in loss of customer trust, regulatory penalties under GDPR due to data breaches, and operational disruptions. E-commerce platforms, government websites, and enterprises with public-facing PHP applications are particularly vulnerable. The lack of available patches increases the risk window. Attackers can exploit this vulnerability remotely without authentication, making it a prime target for automated scanning and exploitation attempts. The requirement for user interaction (e.g., visiting a malicious link) can be mitigated by user awareness but remains a risk vector. Overall, the vulnerability threatens confidentiality and integrity of affected systems, with potential reputational and financial consequences for European entities.

Mitigation Recommendations

1. Immediately audit all instances of Mikado-Themes Wellspring and identify affected versions prior to 2.8. 2. Disable the PHP allow_url_include directive in php.ini to prevent remote file inclusion (set allow_url_include=Off). 3. Implement strict input validation and sanitization on all parameters used in include/require statements to ensure only local, expected files can be included. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious URL patterns indicative of RFI attempts. 5. Monitor web server logs for unusual requests that include remote URLs or unexpected parameters. 6. Educate users and administrators about the risks of clicking untrusted links that could trigger exploitation. 7. If possible, isolate or sandbox the affected web applications to limit the impact of potential exploitation. 8. Follow Mikado-Themes and WordPress security advisories closely for official patches and apply them promptly once available. 9. Consider temporary removal or replacement of the Wellspring theme if patching is delayed. 10. Conduct regular security assessments and penetration testing focusing on file inclusion vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T09:59:55.701Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695f7a5bc901b06321d0bc1d

Added to database: 1/8/2026, 9:35:23 AM

Last enriched: 1/22/2026, 9:12:32 PM

Last updated: 2/7/2026, 5:20:16 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats