Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68560: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in CodexThemes TheGem Theme Elements (for Elementor)

0
High
VulnerabilityCVE-2025-68560cvecve-2025-68560cwe-98
Published: Tue Dec 23 2025 (12/23/2025, 11:36:26 UTC)
Source: CVE Database V5
Vendor/Project: CodexThemes
Product: TheGem Theme Elements (for Elementor)

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CodexThemes TheGem Theme Elements (for Elementor).This issue affects TheGem Theme Elements (for Elementor): from n/a through 5.10.5.1.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:32:44 UTC

Technical Analysis

CVE-2025-68560 is a remote file inclusion vulnerability classified under CWE-98, affecting the CodexThemes TheGem Theme Elements plugin for Elementor, a widely used WordPress theme extension. The vulnerability stems from improper validation and control over filenames used in PHP include or require statements, which are critical for dynamically loading code. An attacker can exploit this flaw by crafting a malicious request that manipulates the filename parameter, causing the server to include and execute remote code hosted on an attacker-controlled server. This leads to remote code execution (RCE) on the web server, potentially allowing the attacker to take full control over the affected system. The CVSS v3.1 score of 7.5 reflects a high severity due to the network attack vector (AV:N), the requirement for low privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability is critical because it can be exploited remotely without user interaction, making it a significant risk for websites using this plugin. The affected versions include all releases up to 5.10.5.1, with no patch links currently available, indicating that users must monitor for updates or apply temporary mitigations. The vulnerability was reserved and published in December 2025, highlighting its recent discovery and the need for immediate attention. TheGem Theme Elements is popular among European WordPress users, especially in e-commerce and corporate websites, increasing the potential impact in this region.

Potential Impact

For European organizations, this vulnerability poses a severe risk to websites and web applications using the TheGem Theme Elements plugin. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to steal sensitive data, deface websites, deploy malware, or use compromised servers as pivot points for further attacks within the network. This can result in significant reputational damage, financial losses, and regulatory penalties under GDPR due to data breaches. The availability of affected websites may be disrupted, impacting business continuity and customer trust. Given the widespread use of WordPress and Elementor-based themes in Europe, especially in countries with large digital economies like Germany, the UK, France, and the Netherlands, the scale of potential impact is substantial. Organizations with limited patch management capabilities or those lacking robust web application security controls are particularly vulnerable. Additionally, the high severity and ease of remote exploitation without user interaction increase the likelihood of targeted attacks or automated scanning campaigns.

Mitigation Recommendations

1. Monitor official CodexThemes and WordPress plugin repositories for security updates and apply patches immediately once available. 2. In the absence of a patch, implement strict input validation and sanitization on all parameters that influence file inclusion paths to prevent injection of remote URLs. 3. Configure PHP settings to disable allow_url_include and allow_url_fopen directives to prevent inclusion of remote files. 4. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block remote file inclusion attempts, including suspicious URL patterns and payloads. 5. Restrict file inclusion to a whitelist of trusted directories using PHP's open_basedir directive to limit the scope of included files. 6. Conduct regular security audits and code reviews of custom themes and plugins to identify similar vulnerabilities. 7. Harden server configurations and ensure minimal privileges for web server processes to limit the impact of potential exploitation. 8. Educate development and IT teams about secure coding practices related to dynamic file inclusion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-19T10:17:23.837Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694a81d070354fdeefdcefc4

Added to database: 12/23/2025, 11:49:36 AM

Last enriched: 1/21/2026, 1:32:44 AM

Last updated: 2/4/2026, 11:41:38 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats