Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68987: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Edge-Themes Cinerama - A WordPress Theme for Movie Studios and Filmmakers

0
Critical
VulnerabilityCVE-2025-68987cvecve-2025-68987
Published: Tue Dec 30 2025 (12/30/2025, 10:47:49 UTC)
Source: CVE Database V5
Vendor/Project: Edge-Themes
Product: Cinerama - A WordPress Theme for Movie Studios and Filmmakers

Description

CVE-2025-68987 is a critical remote file inclusion (RFI) vulnerability in the Edge-Themes Cinerama WordPress theme used by movie studios and filmmakers. It allows unauthenticated attackers to include and execute arbitrary PHP files remotely by exploiting improper control of filename parameters in include/require statements. This vulnerability affects all versions up to and including 2. 4 and has a CVSS score of 9. 8, indicating high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Exploitation could lead to full site compromise, data theft, defacement, or malware deployment. No known public exploits are reported yet, but the severity and ease of exploitation make it a critical risk. European organizations using this theme, especially in countries with high WordPress adoption and media production industries, are at significant risk. Immediate patching or mitigation is essential to prevent exploitation.

AI-Powered Analysis

AILast updated: 01/06/2026, 22:52:01 UTC

Technical Analysis

CVE-2025-68987 is a critical vulnerability classified as a Remote File Inclusion (RFI) flaw in the Edge-Themes Cinerama WordPress theme, specifically designed for movie studios and filmmakers. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. This can lead to arbitrary code execution, enabling attackers to fully compromise the affected web server. The vulnerability affects all versions of the Cinerama theme up to and including version 2.4. The CVSS v3.1 score of 9.8 reflects the vulnerability's high impact and ease of exploitation: it requires no authentication, no user interaction, and can be exploited remotely over the network. Successful exploitation can result in complete loss of confidentiality, integrity, and availability of the affected system. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its critical severity make it a prime target for attackers. The vulnerability is particularly dangerous in WordPress environments where themes are often publicly accessible and frequently targeted. Since the theme is specialized for movie studios and filmmakers, organizations in media production using this theme are at elevated risk. The lack of available patches or updates at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of CVE-2025-68987 can be severe. Compromise of websites running the vulnerable Cinerama theme could lead to unauthorized access to sensitive business data, intellectual property (such as unreleased film content), and customer information. Attackers could deploy malware, deface websites, or use compromised servers as a foothold for further network intrusion. This could damage brand reputation, lead to regulatory penalties under GDPR due to data breaches, and cause operational disruptions. Media and entertainment companies, which are significant in countries like the UK, Germany, France, and Italy, may face targeted attacks due to the strategic value of their content. Additionally, compromised WordPress sites can be used to launch phishing campaigns or distribute malware to European users, amplifying the threat. The critical severity and ease of exploitation mean that even small organizations using this theme are at risk, potentially leading to widespread impact across the European media sector.

Mitigation Recommendations

1. Immediately identify and inventory all WordPress installations using the Cinerama theme, especially versions up to 2.4. 2. Apply any available patches or updates from Edge-Themes as soon as they are released. If no patch is available, consider temporarily disabling or replacing the theme with a secure alternative. 3. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit remote file inclusion, such as blocking suspicious include/require parameters or requests containing remote URLs. 4. Restrict PHP functions that allow remote file inclusion (e.g., disable allow_url_include in php.ini) to prevent exploitation. 5. Harden WordPress installations by limiting file permissions and isolating web server processes to minimize impact if exploited. 6. Monitor web server logs for unusual requests targeting include or require parameters. 7. Educate site administrators about the risks and signs of compromise related to this vulnerability. 8. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 9. Conduct penetration testing or vulnerability scanning focused on this RFI vulnerability to verify mitigation effectiveness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-29T11:18:04.294Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a0db813ff03e2bda4c

Added to database: 12/30/2025, 10:22:24 PM

Last enriched: 1/6/2026, 10:52:01 PM

Last updated: 1/8/2026, 7:24:01 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats