Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67940: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Mikado-Themes Powerlift

0
High
VulnerabilityCVE-2025-67940cvecve-2025-67940
Published: Thu Jan 22 2026 (01/22/2026, 16:51:53 UTC)
Source: CVE Database V5
Vendor/Project: Mikado-Themes
Product: Powerlift

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Powerlift powerlift allows PHP Local File Inclusion.This issue affects Powerlift: from n/a through < 3.2.1.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:28:43 UTC

Technical Analysis

CVE-2025-67940 is a vulnerability identified in the Mikado-Themes Powerlift WordPress theme, affecting all versions prior to 3.2.1. The issue arises from improper control of the filename parameter used in PHP include or require statements, leading to a Remote File Inclusion (RFI) or Local File Inclusion (LFI) vulnerability. This allows an attacker to manipulate the file path to include arbitrary files from the server or potentially remote locations, depending on server configuration. Exploiting this vulnerability can lead to execution of arbitrary PHP code, disclosure of sensitive files, and full compromise of the web server hosting the vulnerable theme. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, but it has a high attack complexity due to the need for specific conditions in the server environment. The CVSS v3.1 score of 8.1 reflects high impact on confidentiality, integrity, and availability, as an attacker could gain complete control over the affected system. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers once weaponized. The vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure. The lack of patch links suggests users must rely on vendor updates or mitigations. Given the widespread use of WordPress themes in Europe, this vulnerability poses a significant risk to websites using Mikado-Themes Powerlift, especially those that have not updated to the fixed version 3.2.1 or later.

Potential Impact

For European organizations, this vulnerability poses a severe risk to websites and web applications using the Mikado-Themes Powerlift theme. Successful exploitation can lead to unauthorized disclosure of sensitive data, including customer information and internal files, undermining confidentiality. Attackers can also modify website content or inject malicious code, impacting integrity and potentially damaging brand reputation. Availability may be affected if attackers execute denial-of-service attacks or disrupt web server operations. Organizations in sectors such as e-commerce, finance, healthcare, and government are particularly vulnerable due to the sensitive nature of their data and regulatory requirements like GDPR. The ease of remote exploitation without authentication increases the likelihood of attacks, especially against unpatched systems. Additionally, compromised websites can be used as launchpads for further attacks, including phishing or malware distribution, amplifying the threat landscape. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency for remediation.

Mitigation Recommendations

1. Immediate upgrade to Mikado-Themes Powerlift version 3.2.1 or later, where the vulnerability is patched. 2. If immediate upgrade is not possible, implement web application firewall (WAF) rules to block suspicious requests attempting to manipulate include/require parameters. 3. Restrict PHP file inclusion paths using open_basedir and disable allow_url_include in PHP configurations to prevent remote file inclusion. 4. Conduct thorough code reviews and audits of custom theme modifications to ensure no unsafe file inclusion practices exist. 5. Monitor web server logs for unusual access patterns or attempts to exploit file inclusion vulnerabilities. 6. Employ intrusion detection systems (IDS) to detect exploitation attempts. 7. Educate web administrators and developers on secure coding practices related to file inclusion and input validation. 8. Regularly backup website data and configurations to enable rapid recovery in case of compromise. 9. Coordinate with hosting providers to ensure server-level security controls are in place and updated.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:06.384Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259144623b1157c7fae5b

Added to database: 1/22/2026, 5:06:28 PM

Last enriched: 1/30/2026, 8:28:43 AM

Last updated: 2/7/2026, 4:08:40 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats