Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69077: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Hobo

0
High
VulnerabilityCVE-2025-69077cvecve-2025-69077
Published: Thu Jan 22 2026 (01/22/2026, 16:52:25 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Hobo

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Hobo hobo allows PHP Local File Inclusion.This issue affects Hobo: from n/a through <= 1.0.10.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:37:09 UTC

Technical Analysis

CVE-2025-69077 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly known as a PHP Local File Inclusion (LFI) flaw, affecting the AncoraThemes Hobo WordPress theme up to version 1.0.10. The vulnerability arises because the theme improperly sanitizes or validates user-supplied input used in PHP include or require statements, allowing an attacker to manipulate the filename parameter. This manipulation enables the attacker to include arbitrary local files from the server's filesystem into the PHP execution context. Exploiting this vulnerability can lead to remote code execution if an attacker can include files containing malicious PHP code or leverage other chained vulnerabilities. The CVSS v3.1 base score is 8.1, indicating a high severity with network attack vector, high impact on confidentiality, integrity, and availability, no privileges required, and no user interaction needed. No known public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers seeking to compromise WordPress sites using this theme. The vulnerability affects all installations of the Hobo theme up to version 1.0.10, and no patch links are currently provided, emphasizing the need for immediate defensive measures.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites running the vulnerable Hobo theme, potentially leading to unauthorized disclosure of sensitive data, full site compromise, defacement, or service disruption. Attackers exploiting this flaw can execute arbitrary PHP code remotely, which may allow them to pivot within the network, steal credentials, or deploy ransomware. Given the widespread use of WordPress in Europe and the popularity of AncoraThemes products among small to medium enterprises and bloggers, the attack surface is considerable. Compromised websites can also be used as launchpads for further attacks against European customers or partners, damaging reputation and causing regulatory compliance issues under GDPR due to data breaches. The lack of authentication requirements and user interaction makes the vulnerability easy to exploit remotely, increasing the urgency for European organizations to act swiftly.

Mitigation Recommendations

1. Monitor AncoraThemes official channels for patches or updates addressing CVE-2025-69077 and apply them immediately upon release. 2. Until a patch is available, disable or remove the Hobo theme from production environments or replace it with a secure alternative. 3. Implement strict input validation and sanitization on any custom code or plugins that interact with file inclusion functions. 4. Deploy Web Application Firewalls (WAFs) with rules designed to detect and block attempts to exploit LFI vulnerabilities, such as suspicious URL parameters or directory traversal patterns. 5. Conduct thorough security audits of all WordPress themes and plugins to identify similar insecure coding practices. 6. Restrict file permissions on web servers to limit access to sensitive files and prevent unauthorized inclusion. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Educate site administrators about the risks of using outdated or untrusted themes and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-29T11:19:12.554Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259254623b1157c7fb210

Added to database: 1/22/2026, 5:06:45 PM

Last enriched: 1/30/2026, 8:37:09 AM

Last updated: 2/5/2026, 12:19:55 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats