CVE-2025-9991: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in migli Tiny Bootstrap Elements Light
CVE-2025-9991 is a high-severity Local File Inclusion (LFI) vulnerability in the Tiny Bootstrap Elements Light WordPress plugin affecting all versions up to 4. 3. 34. It allows unauthenticated attackers to manipulate the 'language' parameter to include and execute arbitrary PHP files on the server. This can lead to full remote code execution, bypassing access controls and exposing sensitive data. Exploitation requires no user interaction but has a high attack complexity due to the need to upload or control PHP files on the server. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with lax file upload controls. Mitigation requires immediate plugin updates or disabling the vulnerable plugin and implementing strict file upload and web application firewall rules. Countries with high WordPress adoption and significant web hosting industries, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-9991 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Tiny Bootstrap Elements Light plugin for WordPress in all versions up to 4.3.34. The vulnerability arises from improper control of the filename used in PHP include or require statements, specifically via the 'language' parameter. An unauthenticated attacker can exploit this flaw by manipulating the parameter to include arbitrary PHP files from the server, leading to remote code execution. This can be leveraged to bypass access controls, extract sensitive information, or execute malicious PHP code if the attacker can upload or otherwise place PHP files on the server. The vulnerability has a CVSS 3.1 base score of 8.1, indicating high severity, with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a critical risk for WordPress sites using this plugin. The lack of a patch link suggests that a fix may not yet be available, increasing urgency for mitigation. The vulnerability is particularly dangerous in environments where file upload functionality is enabled without strict validation, as attackers can upload malicious PHP payloads to be included and executed. The issue highlights the importance of secure coding practices around dynamic file inclusion and parameter validation in PHP applications.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites, which are widely used across Europe for business, government, and e-commerce purposes. Successful exploitation can lead to full compromise of the affected web server, resulting in data breaches, defacement, service disruption, or pivoting to internal networks. Confidential customer and employee data could be exposed, violating GDPR and other data protection regulations, leading to legal and financial penalties. The ability to execute arbitrary PHP code also enables attackers to install backdoors, ransomware, or use the compromised server as a launchpad for further attacks. Organizations with public-facing WordPress sites using the Tiny Bootstrap Elements Light plugin are particularly vulnerable. The high severity and unauthenticated nature of the exploit increase the likelihood of targeted attacks or opportunistic scanning by automated tools. This threat also impacts hosting providers and managed service providers supporting WordPress clients, potentially affecting multiple customers simultaneously.
Mitigation Recommendations
Immediate mitigation steps include disabling or uninstalling the Tiny Bootstrap Elements Light plugin until a secure patch is released. Organizations should monitor official vendor channels and WordPress plugin repositories for updates addressing this vulnerability. Implement strict file upload controls to prevent unauthorized PHP file uploads, including MIME type validation, file extension whitelisting, and scanning uploaded files for malicious content. Deploy Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit LFI vulnerabilities, particularly targeting the 'language' parameter in HTTP requests. Conduct thorough security audits of WordPress installations to identify and remediate other potential vulnerabilities. Employ least privilege principles for web server and PHP execution environments to limit the impact of any successful exploitation. Regularly back up website data and configurations to enable rapid recovery in case of compromise. Educate web administrators on secure plugin management and the risks of outdated or untrusted plugins. Finally, consider implementing runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-9991: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in migli Tiny Bootstrap Elements Light
Description
CVE-2025-9991 is a high-severity Local File Inclusion (LFI) vulnerability in the Tiny Bootstrap Elements Light WordPress plugin affecting all versions up to 4. 3. 34. It allows unauthenticated attackers to manipulate the 'language' parameter to include and execute arbitrary PHP files on the server. This can lead to full remote code execution, bypassing access controls and exposing sensitive data. Exploitation requires no user interaction but has a high attack complexity due to the need to upload or control PHP files on the server. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with lax file upload controls. Mitigation requires immediate plugin updates or disabling the vulnerable plugin and implementing strict file upload and web application firewall rules. Countries with high WordPress adoption and significant web hosting industries, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-9991 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Tiny Bootstrap Elements Light plugin for WordPress in all versions up to 4.3.34. The vulnerability arises from improper control of the filename used in PHP include or require statements, specifically via the 'language' parameter. An unauthenticated attacker can exploit this flaw by manipulating the parameter to include arbitrary PHP files from the server, leading to remote code execution. This can be leveraged to bypass access controls, extract sensitive information, or execute malicious PHP code if the attacker can upload or otherwise place PHP files on the server. The vulnerability has a CVSS 3.1 base score of 8.1, indicating high severity, with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a critical risk for WordPress sites using this plugin. The lack of a patch link suggests that a fix may not yet be available, increasing urgency for mitigation. The vulnerability is particularly dangerous in environments where file upload functionality is enabled without strict validation, as attackers can upload malicious PHP payloads to be included and executed. The issue highlights the importance of secure coding practices around dynamic file inclusion and parameter validation in PHP applications.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites, which are widely used across Europe for business, government, and e-commerce purposes. Successful exploitation can lead to full compromise of the affected web server, resulting in data breaches, defacement, service disruption, or pivoting to internal networks. Confidential customer and employee data could be exposed, violating GDPR and other data protection regulations, leading to legal and financial penalties. The ability to execute arbitrary PHP code also enables attackers to install backdoors, ransomware, or use the compromised server as a launchpad for further attacks. Organizations with public-facing WordPress sites using the Tiny Bootstrap Elements Light plugin are particularly vulnerable. The high severity and unauthenticated nature of the exploit increase the likelihood of targeted attacks or opportunistic scanning by automated tools. This threat also impacts hosting providers and managed service providers supporting WordPress clients, potentially affecting multiple customers simultaneously.
Mitigation Recommendations
Immediate mitigation steps include disabling or uninstalling the Tiny Bootstrap Elements Light plugin until a secure patch is released. Organizations should monitor official vendor channels and WordPress plugin repositories for updates addressing this vulnerability. Implement strict file upload controls to prevent unauthorized PHP file uploads, including MIME type validation, file extension whitelisting, and scanning uploaded files for malicious content. Deploy Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit LFI vulnerabilities, particularly targeting the 'language' parameter in HTTP requests. Conduct thorough security audits of WordPress installations to identify and remediate other potential vulnerabilities. Employ least privilege principles for web server and PHP execution environments to limit the impact of any successful exploitation. Regularly back up website data and configurations to enable rapid recovery in case of compromise. Educate web administrators on secure plugin management and the risks of outdated or untrusted plugins. Finally, consider implementing runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-04T14:15:12.637Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68db52afa473ffe031e44804
Added to database: 9/30/2025, 3:46:55 AM
Last enriched: 10/7/2025, 11:34:58 AM
Last updated: 11/12/2025, 4:52:47 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12901: CWE-352 Cross-Site Request Forgery (CSRF) in asgaros Asgaros Forum
MediumCVE-2025-12833: CWE-639 Authorization Bypass Through User-Controlled Key in paoltaia GeoDirectory – WP Business Directory Plugin and Classified Listings Directory
MediumCVE-2025-12087: CWE-639 Authorization Bypass Through User-Controlled Key in acowebs Wishlist and Save for later for Woocommerce
MediumCVE-2025-54983: CWE-772 Missing Release of Resource after Effective Lifetime in Zscaler Zscaler Client Connector
MediumCVE-2025-43205: An app may be able to bypass ASLR in Apple watchOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.