Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68974: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in miniOrange WordPress Social Login and Register

0
Critical
VulnerabilityCVE-2025-68974cvecve-2025-68974
Published: Tue Dec 30 2025 (12/30/2025, 10:47:47 UTC)
Source: CVE Database V5
Vendor/Project: miniOrange
Product: WordPress Social Login and Register

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in miniOrange WordPress Social Login and Register miniorange-login-openid allows PHP Local File Inclusion.This issue affects WordPress Social Login and Register: from n/a through <= 7.7.0.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:00:18 UTC

Technical Analysis

CVE-2025-68974 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically affecting the miniOrange WordPress Social Login and Register plugin (up to version 7.7.0). This vulnerability enables PHP Remote File Inclusion (RFI), where an attacker can manipulate the filename parameter used in PHP's include or require statements to load and execute arbitrary PHP code from a remote source. The root cause is insufficient validation or sanitization of user-supplied input controlling the file path, allowing attackers to specify external URLs or local files. Exploiting this flaw can lead to remote code execution, enabling attackers to take over the web server, access sensitive data, modify website content, or pivot to internal networks. The vulnerability affects WordPress sites using this plugin, which is widely adopted for social login and registration features. Although no public exploits are reported yet, the nature of RFI vulnerabilities makes them highly attractive targets. The vulnerability was reserved and published in late December 2025, but no CVSS score or patch links are currently available, indicating a need for vigilance and proactive mitigation by site administrators.

Potential Impact

The impact on European organizations can be severe due to the potential for remote code execution on web servers hosting WordPress sites with the vulnerable plugin. Attackers could gain unauthorized access to sensitive user data, including personal information and authentication credentials, leading to data breaches and regulatory non-compliance under GDPR. Additionally, compromised websites could be defaced, used to distribute malware, or serve as a foothold for lateral movement within corporate networks. Organizations relying on WordPress for e-commerce, government services, or critical communications are particularly at risk. The disruption could result in reputational damage, financial losses, and legal consequences. Given the widespread use of WordPress and the popularity of miniOrange plugins, the attack surface is broad, increasing the likelihood of targeted attacks against European entities.

Mitigation Recommendations

1. Monitor miniOrange official channels for security updates and apply patches immediately once released. 2. In the interim, disable or remove the vulnerable plugin if possible to eliminate the attack vector. 3. Implement strict input validation and sanitization on all user-supplied data controlling file includes, ensuring only trusted, local files are referenced. 4. Configure PHP settings to disable allow_url_include and allow_url_fopen directives to prevent remote file inclusion. 5. Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious include/require requests. 6. Conduct regular security audits and code reviews of custom plugins or themes to detect similar vulnerabilities. 7. Maintain up-to-date backups and incident response plans to recover quickly from potential compromises. 8. Educate site administrators on the risks of installing unverified plugins and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-29T11:17:52.921Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695450aedb813ff03e2bec49

Added to database: 12/30/2025, 10:22:38 PM

Last enriched: 12/30/2025, 11:00:18 PM

Last updated: 1/8/2026, 7:23:59 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats