CVE-2025-68506: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Nawawi Jamili Docket Cache
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nawawi Jamili Docket Cache docket-cache allows PHP Local File Inclusion.This issue affects Docket Cache: from n/a through <= 24.07.03.
AI Analysis
Technical Summary
CVE-2025-68506 is a critical vulnerability classified as a Remote File Inclusion (RFI) flaw in the Nawawi Jamili Docket Cache PHP application, affecting versions up to and including 24.07.03. The vulnerability stems from improper validation and control of filenames used in PHP include or require statements, which allows an attacker to supply a malicious remote file path. When the application includes this attacker-controlled file, it results in arbitrary code execution on the server. This type of vulnerability is particularly dangerous because it requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can execute arbitrary PHP code, potentially leading to full system compromise, data theft, or service disruption. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a prime target for attackers. The affected product, Docket Cache, is used for managing legal or docket-related documents, which may contain sensitive or regulated information, increasing the risk and impact of exploitation. Technical mitigation is complicated by the lack of an official patch at the time of publication, but best practices include disabling remote file inclusion in PHP configurations, restricting include paths, and deploying web application firewalls (WAFs) capable of detecting and blocking RFI attempts.
Potential Impact
For European organizations, the impact of CVE-2025-68506 can be severe. Exploitation can lead to full server compromise, allowing attackers to access sensitive legal or docket data, modify or delete records, and disrupt critical document management services. This can result in significant confidentiality breaches, integrity violations, and availability outages. Organizations in sectors such as legal services, government agencies, and enterprises relying on Docket Cache for document workflows are particularly vulnerable. The breach of sensitive legal documents could lead to regulatory penalties under GDPR and other data protection laws, reputational damage, and operational downtime. Additionally, compromised servers could be used as pivot points for further attacks within corporate networks. The vulnerability's remote and unauthenticated nature increases the risk of widespread exploitation if not promptly addressed.
Mitigation Recommendations
1. Apply official patches or updates from Nawawi Jamili as soon as they become available to fix the vulnerability. 2. In the interim, disable PHP's allow_url_include directive to prevent remote file inclusion. 3. Restrict PHP include paths to trusted directories only, using open_basedir or similar configuration settings. 4. Implement strict input validation and sanitization on any user-supplied data that influences file inclusion logic. 5. Deploy a web application firewall (WAF) with signatures or rules designed to detect and block RFI attempts targeting PHP applications. 6. Conduct thorough code audits to identify and remediate any other unsafe include/require statements. 7. Monitor web server logs and network traffic for suspicious requests that may indicate exploitation attempts. 8. Consider isolating the Docket Cache application environment to limit the blast radius in case of compromise. 9. Educate development and operations teams about secure coding practices related to file inclusion vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands
CVE-2025-68506: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Nawawi Jamili Docket Cache
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nawawi Jamili Docket Cache docket-cache allows PHP Local File Inclusion.This issue affects Docket Cache: from n/a through <= 24.07.03.
AI-Powered Analysis
Technical Analysis
CVE-2025-68506 is a critical vulnerability classified as a Remote File Inclusion (RFI) flaw in the Nawawi Jamili Docket Cache PHP application, affecting versions up to and including 24.07.03. The vulnerability stems from improper validation and control of filenames used in PHP include or require statements, which allows an attacker to supply a malicious remote file path. When the application includes this attacker-controlled file, it results in arbitrary code execution on the server. This type of vulnerability is particularly dangerous because it requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can execute arbitrary PHP code, potentially leading to full system compromise, data theft, or service disruption. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a prime target for attackers. The affected product, Docket Cache, is used for managing legal or docket-related documents, which may contain sensitive or regulated information, increasing the risk and impact of exploitation. Technical mitigation is complicated by the lack of an official patch at the time of publication, but best practices include disabling remote file inclusion in PHP configurations, restricting include paths, and deploying web application firewalls (WAFs) capable of detecting and blocking RFI attempts.
Potential Impact
For European organizations, the impact of CVE-2025-68506 can be severe. Exploitation can lead to full server compromise, allowing attackers to access sensitive legal or docket data, modify or delete records, and disrupt critical document management services. This can result in significant confidentiality breaches, integrity violations, and availability outages. Organizations in sectors such as legal services, government agencies, and enterprises relying on Docket Cache for document workflows are particularly vulnerable. The breach of sensitive legal documents could lead to regulatory penalties under GDPR and other data protection laws, reputational damage, and operational downtime. Additionally, compromised servers could be used as pivot points for further attacks within corporate networks. The vulnerability's remote and unauthenticated nature increases the risk of widespread exploitation if not promptly addressed.
Mitigation Recommendations
1. Apply official patches or updates from Nawawi Jamili as soon as they become available to fix the vulnerability. 2. In the interim, disable PHP's allow_url_include directive to prevent remote file inclusion. 3. Restrict PHP include paths to trusted directories only, using open_basedir or similar configuration settings. 4. Implement strict input validation and sanitization on any user-supplied data that influences file inclusion logic. 5. Deploy a web application firewall (WAF) with signatures or rules designed to detect and block RFI attempts targeting PHP applications. 6. Conduct thorough code audits to identify and remediate any other unsafe include/require statements. 7. Monitor web server logs and network traffic for suspicious requests that may indicate exploitation attempts. 8. Consider isolating the Docket Cache application environment to limit the blast radius in case of compromise. 9. Educate development and operations teams about secure coding practices related to file inclusion vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-19T10:16:51.230Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694bea1e279c98bf57f75247
Added to database: 12/24/2025, 1:26:54 PM
Last enriched: 1/21/2026, 1:25:47 AM
Last updated: 2/7/2026, 12:06:10 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.