Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69373: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in beeteam368 VidoRev

0
High
VulnerabilityCVE-2025-69373cvecve-2025-69373
Published: Fri Feb 20 2026 (02/20/2026, 15:46:51 UTC)
Source: CVE Database V5
Vendor/Project: beeteam368
Product: VidoRev

Description

CVE-2025-69373 is a Remote File Inclusion (RFI) vulnerability affecting the beeteam368 VidoRev PHP application up to version 2. 9. 9. 9. 9. 9. 7. The flaw arises from improper control of filenames used in PHP include/require statements, allowing attackers to include and execute arbitrary remote files. This can lead to remote code execution, compromising the confidentiality, integrity, and availability of affected systems. Although no known exploits are currently in the wild, the vulnerability poses a significant risk if weaponized.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:41:06 UTC

Technical Analysis

CVE-2025-69373 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically affecting the beeteam368 VidoRev product up to version 2.9.9.9.9.9.7. This vulnerability allows Remote File Inclusion (RFI), where an attacker can manipulate the filename parameter used in PHP's include or require statements to load and execute malicious code from a remote server. The root cause is insufficient validation or sanitization of user-supplied input that controls the file path. When exploited, this can lead to remote code execution on the server hosting the VidoRev application, enabling attackers to execute arbitrary PHP code, potentially leading to full system compromise. The vulnerability does not require authentication, increasing its risk profile. While no public exploits are currently known, the nature of RFI vulnerabilities historically makes them attractive targets for attackers. The vulnerability affects a niche but widely used PHP-based video platform, which is often deployed in content delivery and media streaming environments. The lack of a CVSS score indicates that the vulnerability is newly published and awaiting further assessment. The vulnerability was reserved at the end of 2025 and published in early 2026, indicating recent discovery. The absence of patches at the time of publication suggests that mitigation efforts are urgent. The vulnerability's exploitation could also facilitate lateral movement within networks or data exfiltration if attackers gain initial access through this vector.

Potential Impact

The impact of CVE-2025-69373 is significant for organizations using the beeteam368 VidoRev platform. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, defacement, or service disruption. This can affect the confidentiality of sensitive media content, integrity of the application and its data, and availability of video streaming services. Organizations relying on VidoRev for customer-facing or internal video services may experience operational downtime and reputational damage. Additionally, compromised servers can be used as pivot points for further attacks within corporate networks. Given the remote and unauthenticated nature of the vulnerability, the attack surface is broad, increasing the likelihood of exploitation once public exploits emerge. The lack of known exploits currently provides a window for proactive mitigation, but the risk remains high due to the ease with which RFI vulnerabilities can be weaponized. Industries such as media, entertainment, education, and any sector using video streaming platforms are particularly vulnerable. The impact extends beyond individual organizations to their customers and partners, potentially affecting supply chains and service ecosystems.

Mitigation Recommendations

To mitigate CVE-2025-69373, organizations should immediately audit their use of the beeteam368 VidoRev platform and identify affected versions. Since no official patches are currently available, interim mitigations include disabling PHP's allow_url_include directive to prevent remote file inclusion, and setting allow_url_fopen to off to reduce remote file access risks. Implement strict input validation and sanitization on all parameters controlling file inclusion, ensuring only expected local files can be referenced. Employ web application firewalls (WAFs) with rules to detect and block suspicious include/require requests containing remote URLs or directory traversal patterns. Monitor application logs for unusual file inclusion attempts and anomalous PHP execution. Restrict file system permissions to limit the impact of any successful code execution. Plan for prompt application updates once vendor patches are released. Additionally, conduct regular security assessments and penetration testing focused on file inclusion vulnerabilities. Educate development teams on secure coding practices to prevent similar issues in future releases. Consider isolating the VidoRev application in a segmented network zone to contain potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-31T20:13:05.451Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9f8be58cf853bab8c9f

Added to database: 2/20/2026, 8:54:16 PM

Last enriched: 2/20/2026, 9:41:06 PM

Last updated: 2/21/2026, 6:26:54 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats