Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68506: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Nawawi Jamili Docket Cache

0
Critical
VulnerabilityCVE-2025-68506cvecve-2025-68506
Published: Wed Dec 24 2025 (12/24/2025, 13:10:26 UTC)
Source: CVE Database V5
Vendor/Project: Nawawi Jamili
Product: Docket Cache

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nawawi Jamili Docket Cache docket-cache allows PHP Local File Inclusion.This issue affects Docket Cache: from n/a through <= 24.07.03.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:25:47 UTC

Technical Analysis

CVE-2025-68506 is a critical vulnerability classified as a Remote File Inclusion (RFI) flaw in the Nawawi Jamili Docket Cache PHP application, affecting versions up to and including 24.07.03. The vulnerability stems from improper validation and control of filenames used in PHP include or require statements, which allows an attacker to supply a malicious remote file path. When the application includes this attacker-controlled file, it results in arbitrary code execution on the server. This type of vulnerability is particularly dangerous because it requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can execute arbitrary PHP code, potentially leading to full system compromise, data theft, or service disruption. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a prime target for attackers. The affected product, Docket Cache, is used for managing legal or docket-related documents, which may contain sensitive or regulated information, increasing the risk and impact of exploitation. Technical mitigation is complicated by the lack of an official patch at the time of publication, but best practices include disabling remote file inclusion in PHP configurations, restricting include paths, and deploying web application firewalls (WAFs) capable of detecting and blocking RFI attempts.

Potential Impact

For European organizations, the impact of CVE-2025-68506 can be severe. Exploitation can lead to full server compromise, allowing attackers to access sensitive legal or docket data, modify or delete records, and disrupt critical document management services. This can result in significant confidentiality breaches, integrity violations, and availability outages. Organizations in sectors such as legal services, government agencies, and enterprises relying on Docket Cache for document workflows are particularly vulnerable. The breach of sensitive legal documents could lead to regulatory penalties under GDPR and other data protection laws, reputational damage, and operational downtime. Additionally, compromised servers could be used as pivot points for further attacks within corporate networks. The vulnerability's remote and unauthenticated nature increases the risk of widespread exploitation if not promptly addressed.

Mitigation Recommendations

1. Apply official patches or updates from Nawawi Jamili as soon as they become available to fix the vulnerability. 2. In the interim, disable PHP's allow_url_include directive to prevent remote file inclusion. 3. Restrict PHP include paths to trusted directories only, using open_basedir or similar configuration settings. 4. Implement strict input validation and sanitization on any user-supplied data that influences file inclusion logic. 5. Deploy a web application firewall (WAF) with signatures or rules designed to detect and block RFI attempts targeting PHP applications. 6. Conduct thorough code audits to identify and remediate any other unsafe include/require statements. 7. Monitor web server logs and network traffic for suspicious requests that may indicate exploitation attempts. 8. Consider isolating the Docket Cache application environment to limit the blast radius in case of compromise. 9. Educate development and operations teams about secure coding practices related to file inclusion vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-19T10:16:51.230Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694bea1e279c98bf57f75247

Added to database: 12/24/2025, 1:26:54 PM

Last enriched: 1/21/2026, 1:25:47 AM

Last updated: 2/7/2026, 12:06:10 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats