Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68546: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Thembay Nika

0
High
VulnerabilityCVE-2025-68546cvecve-2025-68546cwe-98
Published: Tue Dec 23 2025 (12/23/2025, 12:00:07 UTC)
Source: CVE Database V5
Vendor/Project: Thembay
Product: Nika

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Thembay Nika allows PHP Local File Inclusion.This issue affects Nika: from n/a through 1.2.14.

AI-Powered Analysis

AILast updated: 12/23/2025, 12:34:20 UTC

Technical Analysis

CVE-2025-68546 is a vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP applications. Specifically, this vulnerability affects Thembay's Nika product up to version 1.2.14. The flaw allows an attacker to perform remote file inclusion (RFI), a critical security issue where an attacker can manipulate the filename parameter to include and execute malicious code hosted on a remote server. This occurs because the application does not properly validate or sanitize user-supplied input that determines which files are included. The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:H) and requires low privileges (PR:L) but no user interaction (UI:N). The impact is severe, with high confidentiality, integrity, and availability consequences (C:H/I:H/A:H), meaning attackers can potentially execute arbitrary code, steal sensitive data, modify or delete data, and disrupt service availability. Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially for web-facing applications. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations. The vulnerability was reserved and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a critical risk to web applications built on or incorporating Thembay's Nika PHP program. Successful exploitation could lead to remote code execution, enabling attackers to gain unauthorized access to sensitive data, manipulate or destroy data, and disrupt business operations. This could result in data breaches, financial losses, reputational damage, and regulatory penalties under GDPR. Organizations relying on Nika for e-commerce, content management, or other web services are particularly vulnerable. The high CVSS score reflects the potential for widespread impact if exploited, especially in environments where PHP configurations allow remote file inclusion or where input validation is insufficient. The absence of known exploits in the wild provides a window for proactive defense but also means attackers may develop exploits soon. The vulnerability's exploitation could also serve as a foothold for further lateral movement within networks, increasing the overall risk posture of affected entities.

Mitigation Recommendations

European organizations should immediately audit their use of Thembay Nika and identify affected versions (up to 1.2.14). Until official patches are released, implement strict input validation and sanitization to ensure that include/require parameters cannot be manipulated to reference remote or unauthorized files. Disable PHP's allow_url_include directive to prevent remote file inclusion at the configuration level. Employ web application firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities. Conduct code reviews to identify and refactor unsafe include/require statements, replacing dynamic includes with fixed paths where possible. Monitor logs for suspicious requests targeting file inclusion parameters. Prepare incident response plans specific to web application compromise scenarios. Once vendor patches become available, prioritize their deployment in all affected environments. Additionally, restrict network access to administration interfaces and ensure least privilege principles are enforced for application users.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-19T10:17:17.171Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694a88f670354fdeefe4c6ca

Added to database: 12/23/2025, 12:20:06 PM

Last enriched: 12/23/2025, 12:34:20 PM

Last updated: 12/23/2025, 3:30:31 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats