Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68543: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thembay Diza

0
High
VulnerabilityCVE-2025-68543cvecve-2025-68543
Published: Fri Feb 20 2026 (02/20/2026, 15:46:40 UTC)
Source: CVE Database V5
Vendor/Project: thembay
Product: Diza

Description

CVE-2025-68543 is a Remote File Inclusion (RFI) vulnerability in the thembay Diza PHP program, affecting versions up to 1. 3. 15. The vulnerability arises from improper control of filenames used in include/require statements, allowing attackers to include and execute arbitrary remote files. This can lead to remote code execution, data disclosure, and full system compromise. No known exploits are currently reported in the wild, and no official patches have been published yet. The vulnerability affects websites and applications using the Diza product, which is a PHP-based solution. Exploitation requires the attacker to control input that influences file inclusion paths, often achievable via web requests. Organizations using Diza should urgently review and restrict file inclusion mechanisms and monitor for suspicious activity. Countries with significant usage of PHP-based CMS and e-commerce platforms, especially where thembay products are popular, are at higher risk.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:23:38 UTC

Technical Analysis

CVE-2025-68543 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in the PHP program thembay Diza, specifically versions up to and including 1.3.15. This vulnerability is a form of Remote File Inclusion (RFI), where the application fails to properly validate or sanitize user-supplied input used in PHP include or require statements. As a result, an attacker can manipulate the filename parameter to include malicious remote files, which the PHP interpreter then executes. This can lead to remote code execution, allowing attackers to run arbitrary code on the server hosting the vulnerable application. The vulnerability is particularly dangerous because it can be exploited remotely without authentication, often via crafted HTTP requests. Although no known exploits have been reported in the wild yet, the lack of patches and the nature of the vulnerability make it a critical risk. The vulnerability affects the thembay Diza product, a PHP-based software solution, potentially used in web applications or content management systems. The absence of a CVSS score indicates that the vulnerability is newly published and not yet fully assessed, but the technical nature suggests a high severity. The vulnerability was reserved in December 2025 and published in February 2026, indicating recent discovery. Organizations using Diza should prioritize code review, input validation, and monitor for suspicious file inclusion attempts.

Potential Impact

The impact of CVE-2025-68543 is significant for organizations running the thembay Diza PHP application. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the affected server. This can result in full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks within the network. Confidentiality, integrity, and availability of the affected systems are at risk. Additionally, attackers could deploy malware, ransomware, or backdoors, leading to long-term persistence. The vulnerability can disrupt business operations, damage reputation, and incur regulatory penalties if sensitive data is exposed. Since no patches are currently available, organizations remain exposed until mitigations are applied. The scope includes all installations of thembay Diza up to version 1.3.15, potentially affecting numerous websites and applications globally. The ease of exploitation without authentication and no user interaction needed increases the threat level.

Mitigation Recommendations

To mitigate CVE-2025-68543, organizations should immediately audit all instances of thembay Diza and identify affected versions. Until an official patch is released, implement strict input validation and sanitization on all parameters that influence file inclusion paths. Disable remote file inclusion in PHP configurations by setting 'allow_url_include' to 'Off' and 'allow_url_fopen' to 'Off' if not required. Employ web application firewalls (WAFs) to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities. Restrict file permissions and isolate the web server environment to limit the impact of potential exploitation. Monitor logs for unusual file inclusion attempts or unexpected remote requests. Engage with the vendor or community for updates and patches, and plan for rapid deployment once available. Consider code refactoring to avoid dynamic file inclusion based on user input. Regularly back up critical data and maintain incident response readiness to quickly address any compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-19T10:17:09.987Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9f0be58cf853bab85ba

Added to database: 2/20/2026, 8:54:08 PM

Last enriched: 2/20/2026, 9:23:38 PM

Last updated: 2/21/2026, 6:28:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats