Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68983: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thembay Greenmart

0
Critical
VulnerabilityCVE-2025-68983cvecve-2025-68983
Published: Tue Dec 30 2025 (12/30/2025, 10:47:49 UTC)
Source: CVE Database V5
Vendor/Project: thembay
Product: Greenmart

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Greenmart greenmart allows PHP Local File Inclusion.This issue affects Greenmart: from n/a through <= 4.2.11.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:48:03 UTC

Technical Analysis

CVE-2025-68983 is a critical Remote File Inclusion (RFI) vulnerability found in the thembay Greenmart PHP application, affecting all versions up to and including 4.2.11. The root cause is improper validation and control over the filename parameter used in PHP include or require statements, which allows an attacker to specify a remote file URL. When exploited, this leads to the remote execution of arbitrary PHP code on the server, effectively giving the attacker full control over the affected system. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS 3.1 base score of 9.8 reflects the criticality, with metrics indicating network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact includes complete compromise of confidentiality, integrity, and availability of the affected server and potentially the broader network environment. Although no public exploits have been reported yet, the nature of RFI vulnerabilities historically leads to rapid exploitation once disclosed. The vulnerability affects the Greenmart e-commerce platform, which is used by various online retailers to manage product catalogs and sales, making it a lucrative target for attackers seeking to steal customer data, deploy ransomware, or pivot within networks.

Potential Impact

For European organizations, the impact of CVE-2025-68983 can be severe. Compromise of Greenmart servers could lead to theft of sensitive customer data, including personal and payment information, violating GDPR and other data protection regulations. Attackers could also use the compromised servers as footholds to launch further attacks within corporate networks, potentially disrupting business operations and causing financial losses. The availability of e-commerce services could be disrupted, harming reputation and revenue. Given the criticality and ease of exploitation, organizations running Greenmart without mitigation are at high risk of breach. The impact is particularly significant for sectors reliant on online retail and digital commerce, which are prevalent across Europe. Additionally, regulatory penalties for data breaches could be substantial, increasing the overall cost of an incident.

Mitigation Recommendations

To mitigate CVE-2025-68983, organizations should immediately upgrade Greenmart to a version where this vulnerability is patched once available. In the absence of an official patch, implement the following specific mitigations: 1) Disable PHP's allow_url_include directive to prevent inclusion of remote files. 2) Implement strict input validation and sanitization on all parameters used in include/require statements to ensure only local, expected files can be included. 3) Use whitelisting for file paths instead of user-supplied input. 4) Employ web application firewalls (WAFs) with rules to detect and block attempts to exploit file inclusion vulnerabilities. 5) Monitor server logs and network traffic for unusual requests or patterns indicative of exploitation attempts. 6) Restrict file system permissions to limit the impact of any successful code execution. 7) Conduct regular security audits and code reviews focusing on file inclusion logic. These targeted actions go beyond generic advice and address the specific exploitation vector of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-29T11:17:52.922Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695450afdb813ff03e2bec68

Added to database: 12/30/2025, 10:22:39 PM

Last enriched: 1/21/2026, 1:48:03 AM

Last updated: 2/4/2026, 7:23:37 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats