Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68841: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Themepul TopperPack – Complete Elementor Addons, Theme & CPT Builder

0
Critical
VulnerabilityCVE-2025-68841cvecve-2025-68841
Published: Fri Feb 20 2026 (02/20/2026, 15:46:41 UTC)
Source: CVE Database V5
Vendor/Project: Themepul
Product: TopperPack – Complete Elementor Addons, Theme & CPT Builder

Description

CVE-2025-68841 is a PHP Remote File Inclusion (RFI) vulnerability in the Themepul TopperPack – Complete Elementor Addons, Theme & CPT Builder plugin for WordPress, affecting versions up to 1. 2. 1. The flaw arises from improper control of filenames used in include/require statements, allowing attackers to include remote or local files. Exploitation could lead to arbitrary code execution, enabling attackers to run malicious PHP code on the affected server. This vulnerability does not require user interaction but may require the plugin to be installed and active. No known public exploits have been reported yet. The vulnerability poses a significant risk to websites using this plugin, especially those running PHP environments with default or weak configurations. Immediate patching or mitigation is recommended to prevent potential compromise. Organizations using this plugin should audit their environments and monitor for suspicious activity related to file inclusion attempts.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:25:26 UTC

Technical Analysis

CVE-2025-68841 is a Remote File Inclusion vulnerability found in the Themepul TopperPack – Complete Elementor Addons, Theme & CPT Builder WordPress plugin, specifically affecting versions up to 1.2.1. The vulnerability stems from improper validation or sanitization of user-supplied input used in PHP include or require statements. This flaw allows an attacker to manipulate the filename parameter to include arbitrary files from remote or local sources. When exploited, the attacker can execute arbitrary PHP code within the context of the web server, potentially leading to full system compromise, data theft, or website defacement. The vulnerability is categorized as a PHP Local File Inclusion (LFI) but the description and naming indicate potential for Remote File Inclusion (RFI) as well, depending on server configuration. The plugin is used to extend Elementor, a popular WordPress page builder, which increases the attack surface due to its widespread use in WordPress sites. No CVSS score has been assigned yet, and no public exploits are known at this time. The vulnerability was reserved in late 2025 and published in early 2026, indicating recent discovery. The lack of patch links suggests that a fix may not yet be publicly available, increasing urgency for mitigation. Attackers exploiting this vulnerability do not require user interaction, and the scope includes any WordPress site running the vulnerable plugin version. The vulnerability impacts confidentiality, integrity, and availability of affected systems due to the potential for arbitrary code execution and server takeover.

Potential Impact

The impact of CVE-2025-68841 is potentially severe for organizations running WordPress sites with the vulnerable Themepul TopperPack plugin. Successful exploitation can lead to arbitrary code execution on the web server, allowing attackers to execute malicious scripts, steal sensitive data, modify website content, or pivot to internal networks. This can result in data breaches, defacement, loss of customer trust, and operational disruption. Since WordPress powers a significant portion of the web, and Elementor is widely used, the attack surface is substantial. Organizations in sectors such as e-commerce, finance, healthcare, and government that rely on WordPress for public-facing websites are at heightened risk. The absence of a patch or public exploit increases the risk of zero-day exploitation attempts. Additionally, compromised sites can be used as launchpads for further attacks, including malware distribution or phishing campaigns. The vulnerability affects the confidentiality, integrity, and availability of affected systems, making it a critical concern for website administrators and security teams.

Mitigation Recommendations

1. Immediate mitigation should include disabling or uninstalling the Themepul TopperPack plugin until a security patch is released. 2. Monitor web server logs for suspicious requests attempting to exploit file inclusion, such as unusual URL parameters or attempts to include remote files. 3. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit file inclusion vulnerabilities, focusing on blocking suspicious include/require parameter manipulations. 4. Harden PHP configurations by disabling allow_url_include and allow_url_fopen directives to prevent remote file inclusion. 5. Restrict file permissions on the web server to limit the plugin's ability to access sensitive files. 6. Keep WordPress core, themes, and plugins updated regularly and subscribe to vendor security advisories for timely patching. 7. Conduct a security audit of all installed plugins to identify other potential vulnerabilities. 8. Employ intrusion detection systems to alert on anomalous behavior indicative of exploitation attempts. 9. Once a patch is available, apply it promptly and verify the fix through testing. 10. Educate site administrators on the risks of installing unverified plugins and the importance of security best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-24T13:59:58.566Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9f0be58cf853bab85cc

Added to database: 2/20/2026, 8:54:08 PM

Last enriched: 2/20/2026, 9:25:26 PM

Last updated: 2/20/2026, 11:20:09 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats