CVE-2025-69375: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in SolverWp Portfolio Builder
CVE-2025-69375 is a vulnerability in the SolverWp Portfolio Builder WordPress plugin (version 1. 2. 5 and earlier) that allows improper control of filenames used in PHP include or require statements. This flaw enables a PHP Local File Inclusion (LFI) attack, where an attacker can trick the application into including unintended files from the local server. Although no remote file inclusion is explicitly confirmed, the vulnerability arises from insufficient validation of user-supplied input in file inclusion functions. Exploiting this vulnerability could allow attackers to read sensitive files, disclose configuration data, or execute arbitrary code depending on the server environment. No known exploits are currently reported in the wild, and no official patches or CVSS score have been published yet. Organizations using this plugin should prioritize mitigation to prevent potential exploitation. The threat primarily affects websites running the vulnerable plugin, which are likely to be WordPress sites globally, with higher risk in countries with widespread WordPress usage and significant web hosting infrastructure. The severity is assessed as high due to the potential impact on confidentiality and integrity, ease of exploitation without authentication, and the broad scope of affected systems.
AI Analysis
Technical Summary
CVE-2025-69375 is a Local File Inclusion (LFI) vulnerability found in the SolverWp Portfolio Builder WordPress plugin (versions up to 1.2.5). The issue arises from improper control of the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the server. This can lead to disclosure of sensitive files such as configuration files, password files, or even execution of arbitrary PHP code if the attacker can upload malicious files or leverage other vulnerabilities. The vulnerability does not require authentication, making it accessible to remote attackers. While no known exploits have been reported in the wild, the flaw poses a significant risk due to the widespread use of WordPress and the plugin's presence on publicly accessible websites. The lack of an official patch at the time of publication increases the urgency for mitigation. The vulnerability was reserved at the end of 2025 and published in early 2026, indicating recent discovery. The absence of a CVSS score requires an independent severity assessment based on the potential impact and exploitability.
Potential Impact
If exploited, this vulnerability could allow attackers to read sensitive files on the web server, leading to information disclosure such as database credentials, configuration details, or user data. In some scenarios, it could enable remote code execution if combined with other vulnerabilities or if the attacker can upload malicious files. This compromises the confidentiality, integrity, and availability of the affected systems. Organizations running vulnerable versions of the Portfolio Builder plugin on WordPress sites face risks of website defacement, data breaches, and potential lateral movement within their networks. The impact is particularly severe for organizations relying on these websites for business operations, customer interactions, or hosting sensitive information. The lack of authentication requirements and the ease of exploitation increase the threat level. Additionally, reputational damage and regulatory consequences may arise from successful exploitation.
Mitigation Recommendations
1. Monitor official SolverWp channels and WordPress plugin repositories for patches or updates addressing this vulnerability and apply them immediately once available. 2. In the absence of patches, implement strict input validation and sanitization on any parameters controlling file inclusion paths to prevent manipulation. 3. Employ web application firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities, such as suspicious URL patterns or parameter tampering. 4. Restrict PHP include paths using configuration directives (e.g., open_basedir) to limit accessible directories and prevent inclusion of unauthorized files. 5. Conduct regular security audits and code reviews of custom or third-party plugins to identify similar vulnerabilities proactively. 6. Limit the exposure of the Portfolio Builder plugin by restricting access to trusted users or IP addresses where feasible. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands
CVE-2025-69375: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in SolverWp Portfolio Builder
Description
CVE-2025-69375 is a vulnerability in the SolverWp Portfolio Builder WordPress plugin (version 1. 2. 5 and earlier) that allows improper control of filenames used in PHP include or require statements. This flaw enables a PHP Local File Inclusion (LFI) attack, where an attacker can trick the application into including unintended files from the local server. Although no remote file inclusion is explicitly confirmed, the vulnerability arises from insufficient validation of user-supplied input in file inclusion functions. Exploiting this vulnerability could allow attackers to read sensitive files, disclose configuration data, or execute arbitrary code depending on the server environment. No known exploits are currently reported in the wild, and no official patches or CVSS score have been published yet. Organizations using this plugin should prioritize mitigation to prevent potential exploitation. The threat primarily affects websites running the vulnerable plugin, which are likely to be WordPress sites globally, with higher risk in countries with widespread WordPress usage and significant web hosting infrastructure. The severity is assessed as high due to the potential impact on confidentiality and integrity, ease of exploitation without authentication, and the broad scope of affected systems.
AI-Powered Analysis
Technical Analysis
CVE-2025-69375 is a Local File Inclusion (LFI) vulnerability found in the SolverWp Portfolio Builder WordPress plugin (versions up to 1.2.5). The issue arises from improper control of the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the server. This can lead to disclosure of sensitive files such as configuration files, password files, or even execution of arbitrary PHP code if the attacker can upload malicious files or leverage other vulnerabilities. The vulnerability does not require authentication, making it accessible to remote attackers. While no known exploits have been reported in the wild, the flaw poses a significant risk due to the widespread use of WordPress and the plugin's presence on publicly accessible websites. The lack of an official patch at the time of publication increases the urgency for mitigation. The vulnerability was reserved at the end of 2025 and published in early 2026, indicating recent discovery. The absence of a CVSS score requires an independent severity assessment based on the potential impact and exploitability.
Potential Impact
If exploited, this vulnerability could allow attackers to read sensitive files on the web server, leading to information disclosure such as database credentials, configuration details, or user data. In some scenarios, it could enable remote code execution if combined with other vulnerabilities or if the attacker can upload malicious files. This compromises the confidentiality, integrity, and availability of the affected systems. Organizations running vulnerable versions of the Portfolio Builder plugin on WordPress sites face risks of website defacement, data breaches, and potential lateral movement within their networks. The impact is particularly severe for organizations relying on these websites for business operations, customer interactions, or hosting sensitive information. The lack of authentication requirements and the ease of exploitation increase the threat level. Additionally, reputational damage and regulatory consequences may arise from successful exploitation.
Mitigation Recommendations
1. Monitor official SolverWp channels and WordPress plugin repositories for patches or updates addressing this vulnerability and apply them immediately once available. 2. In the absence of patches, implement strict input validation and sanitization on any parameters controlling file inclusion paths to prevent manipulation. 3. Employ web application firewalls (WAFs) with rules designed to detect and block attempts to exploit file inclusion vulnerabilities, such as suspicious URL patterns or parameter tampering. 4. Restrict PHP include paths using configuration directives (e.g., open_basedir) to limit accessible directories and prevent inclusion of unauthorized files. 5. Conduct regular security audits and code reviews of custom or third-party plugins to identify similar vulnerabilities proactively. 6. Limit the exposure of the Portfolio Builder plugin by restricting access to trusted users or IP addresses where feasible. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-31T20:13:05.451Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6998c9fabe58cf853bab8cf0
Added to database: 2/20/2026, 8:54:18 PM
Last enriched: 2/20/2026, 9:41:41 PM
Last updated: 2/21/2026, 6:28:15 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2863: Path Traversal in feng_ha_ha ssm-erp
MediumCVE-2026-2861: Information Disclosure in Foswiki
MediumCVE-2026-27212: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nolimits4web swiper
CriticalCVE-2026-26047: Uncontrolled Resource Consumption
MediumCVE-2026-26046: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.