CVE-2025-68974: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in miniOrange WordPress Social Login and Register
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in miniOrange WordPress Social Login and Register miniorange-login-openid allows PHP Local File Inclusion.This issue affects WordPress Social Login and Register: from n/a through <= 7.7.0.
AI Analysis
Technical Summary
CVE-2025-68974 is a critical vulnerability classified as a Remote File Inclusion (RFI) flaw in the miniOrange WordPress Social Login and Register plugin, affecting all versions up to and including 7.7.0. The root cause is improper validation and control of filenames used in PHP include or require statements, which allows an attacker to manipulate the input to these statements to include arbitrary files. This can lead to remote code execution by including malicious PHP files hosted on attacker-controlled servers or local files on the server, resulting in full compromise of the affected web server. The vulnerability does not require any authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The plugin is widely used in WordPress environments to enable social login and registration, making it a high-value target for attackers seeking to compromise websites, steal user credentials, or deploy malware. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly likely that exploits will emerge rapidly. The lack of an official patch link in the provided data suggests that users must monitor vendor advisories closely and apply updates as soon as they become available. Additionally, the vulnerability could be leveraged in broader attack campaigns targeting WordPress sites, including data theft, site defacement, or pivoting into internal networks.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the widespread use of WordPress and the popularity of the miniOrange Social Login plugin. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive data including user credentials, and disrupt service availability. This can result in data breaches, loss of customer trust, regulatory penalties under GDPR, and operational downtime. Public sector websites, e-commerce platforms, and enterprises relying on WordPress for customer-facing portals are particularly vulnerable. The ability to exploit this vulnerability remotely without authentication increases the attack surface significantly. Given Europe's strict data protection regulations, a successful attack could have legal and financial repercussions. Furthermore, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to launch supply chain attacks. The absence of known exploits currently provides a small window for mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediately update the miniOrange WordPress Social Login and Register plugin to the latest version once a patch is released by the vendor. 2. Until a patch is available, disable or remove the plugin if feasible to eliminate the attack vector. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate include/require parameters, especially those containing remote URLs or directory traversal sequences. 4. Restrict PHP configuration settings such as 'allow_url_include' to 'Off' to prevent inclusion of remote files. 5. Employ strict input validation and sanitization on any user-controllable parameters related to file inclusion. 6. Monitor web server logs and intrusion detection systems for anomalous requests indicative of exploitation attempts. 7. Conduct regular vulnerability scans and penetration tests focusing on WordPress plugins and custom code. 8. Harden WordPress installations by limiting plugin usage to trusted sources and maintaining least privilege principles for file and directory permissions. 9. Educate web administrators about the risks of RFI vulnerabilities and the importance of timely patching. 10. Prepare incident response plans to quickly contain and remediate any compromise resulting from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-68974: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in miniOrange WordPress Social Login and Register
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in miniOrange WordPress Social Login and Register miniorange-login-openid allows PHP Local File Inclusion.This issue affects WordPress Social Login and Register: from n/a through <= 7.7.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-68974 is a critical vulnerability classified as a Remote File Inclusion (RFI) flaw in the miniOrange WordPress Social Login and Register plugin, affecting all versions up to and including 7.7.0. The root cause is improper validation and control of filenames used in PHP include or require statements, which allows an attacker to manipulate the input to these statements to include arbitrary files. This can lead to remote code execution by including malicious PHP files hosted on attacker-controlled servers or local files on the server, resulting in full compromise of the affected web server. The vulnerability does not require any authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The plugin is widely used in WordPress environments to enable social login and registration, making it a high-value target for attackers seeking to compromise websites, steal user credentials, or deploy malware. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly likely that exploits will emerge rapidly. The lack of an official patch link in the provided data suggests that users must monitor vendor advisories closely and apply updates as soon as they become available. Additionally, the vulnerability could be leveraged in broader attack campaigns targeting WordPress sites, including data theft, site defacement, or pivoting into internal networks.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the widespread use of WordPress and the popularity of the miniOrange Social Login plugin. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive data including user credentials, and disrupt service availability. This can result in data breaches, loss of customer trust, regulatory penalties under GDPR, and operational downtime. Public sector websites, e-commerce platforms, and enterprises relying on WordPress for customer-facing portals are particularly vulnerable. The ability to exploit this vulnerability remotely without authentication increases the attack surface significantly. Given Europe's strict data protection regulations, a successful attack could have legal and financial repercussions. Furthermore, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to launch supply chain attacks. The absence of known exploits currently provides a small window for mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediately update the miniOrange WordPress Social Login and Register plugin to the latest version once a patch is released by the vendor. 2. Until a patch is available, disable or remove the plugin if feasible to eliminate the attack vector. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate include/require parameters, especially those containing remote URLs or directory traversal sequences. 4. Restrict PHP configuration settings such as 'allow_url_include' to 'Off' to prevent inclusion of remote files. 5. Employ strict input validation and sanitization on any user-controllable parameters related to file inclusion. 6. Monitor web server logs and intrusion detection systems for anomalous requests indicative of exploitation attempts. 7. Conduct regular vulnerability scans and penetration tests focusing on WordPress plugins and custom code. 8. Harden WordPress installations by limiting plugin usage to trusted sources and maintaining least privilege principles for file and directory permissions. 9. Educate web administrators about the risks of RFI vulnerabilities and the importance of timely patching. 10. Prepare incident response plans to quickly contain and remediate any compromise resulting from exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-29T11:17:52.921Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695450aedb813ff03e2bec49
Added to database: 12/30/2025, 10:22:38 PM
Last enriched: 1/21/2026, 1:45:53 AM
Last updated: 2/7/2026, 7:35:15 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.