Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68974: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in miniOrange WordPress Social Login and Register

0
Critical
VulnerabilityCVE-2025-68974cvecve-2025-68974
Published: Tue Dec 30 2025 (12/30/2025, 10:47:47 UTC)
Source: CVE Database V5
Vendor/Project: miniOrange
Product: WordPress Social Login and Register

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in miniOrange WordPress Social Login and Register miniorange-login-openid allows PHP Local File Inclusion.This issue affects WordPress Social Login and Register: from n/a through <= 7.7.0.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:45:53 UTC

Technical Analysis

CVE-2025-68974 is a critical vulnerability classified as a Remote File Inclusion (RFI) flaw in the miniOrange WordPress Social Login and Register plugin, affecting all versions up to and including 7.7.0. The root cause is improper validation and control of filenames used in PHP include or require statements, which allows an attacker to manipulate the input to these statements to include arbitrary files. This can lead to remote code execution by including malicious PHP files hosted on attacker-controlled servers or local files on the server, resulting in full compromise of the affected web server. The vulnerability does not require any authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The plugin is widely used in WordPress environments to enable social login and registration, making it a high-value target for attackers seeking to compromise websites, steal user credentials, or deploy malware. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly likely that exploits will emerge rapidly. The lack of an official patch link in the provided data suggests that users must monitor vendor advisories closely and apply updates as soon as they become available. Additionally, the vulnerability could be leveraged in broader attack campaigns targeting WordPress sites, including data theft, site defacement, or pivoting into internal networks.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the widespread use of WordPress and the popularity of the miniOrange Social Login plugin. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive data including user credentials, and disrupt service availability. This can result in data breaches, loss of customer trust, regulatory penalties under GDPR, and operational downtime. Public sector websites, e-commerce platforms, and enterprises relying on WordPress for customer-facing portals are particularly vulnerable. The ability to exploit this vulnerability remotely without authentication increases the attack surface significantly. Given Europe's strict data protection regulations, a successful attack could have legal and financial repercussions. Furthermore, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to launch supply chain attacks. The absence of known exploits currently provides a small window for mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately update the miniOrange WordPress Social Login and Register plugin to the latest version once a patch is released by the vendor. 2. Until a patch is available, disable or remove the plugin if feasible to eliminate the attack vector. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate include/require parameters, especially those containing remote URLs or directory traversal sequences. 4. Restrict PHP configuration settings such as 'allow_url_include' to 'Off' to prevent inclusion of remote files. 5. Employ strict input validation and sanitization on any user-controllable parameters related to file inclusion. 6. Monitor web server logs and intrusion detection systems for anomalous requests indicative of exploitation attempts. 7. Conduct regular vulnerability scans and penetration tests focusing on WordPress plugins and custom code. 8. Harden WordPress installations by limiting plugin usage to trusted sources and maintaining least privilege principles for file and directory permissions. 9. Educate web administrators about the risks of RFI vulnerabilities and the importance of timely patching. 10. Prepare incident response plans to quickly contain and remediate any compromise resulting from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-29T11:17:52.921Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695450aedb813ff03e2bec49

Added to database: 12/30/2025, 10:22:38 PM

Last enriched: 1/21/2026, 1:45:53 AM

Last updated: 2/7/2026, 7:35:15 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats