Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9991: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in migli Tiny Bootstrap Elements Light

0
High
VulnerabilityCVE-2025-9991cvecve-2025-9991cwe-98
Published: Tue Sep 30 2025 (09/30/2025, 03:35:31 UTC)
Source: CVE Database V5
Vendor/Project: migli
Product: Tiny Bootstrap Elements Light

Description

CVE-2025-9991 is a high-severity Local File Inclusion (LFI) vulnerability in the Tiny Bootstrap Elements Light WordPress plugin affecting all versions up to 4. 3. 34. It allows unauthenticated attackers to manipulate the 'language' parameter to include and execute arbitrary PHP files on the server. This can lead to full remote code execution, bypassing access controls and exposing sensitive data. Exploitation requires no user interaction but has a high attack complexity due to the need to upload or control PHP files on the server. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with lax file upload controls. Mitigation requires immediate plugin updates or disabling the vulnerable plugin and implementing strict file upload and web application firewall rules. Countries with high WordPress adoption and significant web hosting industries, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:34:58 UTC

Technical Analysis

CVE-2025-9991 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Tiny Bootstrap Elements Light plugin for WordPress in all versions up to 4.3.34. The vulnerability arises from improper control of the filename used in PHP include or require statements, specifically via the 'language' parameter. An unauthenticated attacker can exploit this flaw by manipulating the parameter to include arbitrary PHP files from the server, leading to remote code execution. This can be leveraged to bypass access controls, extract sensitive information, or execute malicious PHP code if the attacker can upload or otherwise place PHP files on the server. The vulnerability has a CVSS 3.1 base score of 8.1, indicating high severity, with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a critical risk for WordPress sites using this plugin. The lack of a patch link suggests that a fix may not yet be available, increasing urgency for mitigation. The vulnerability is particularly dangerous in environments where file upload functionality is enabled without strict validation, as attackers can upload malicious PHP payloads to be included and executed. The issue highlights the importance of secure coding practices around dynamic file inclusion and parameter validation in PHP applications.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress-based websites, which are widely used across Europe for business, government, and e-commerce purposes. Successful exploitation can lead to full compromise of the affected web server, resulting in data breaches, defacement, service disruption, or pivoting to internal networks. Confidential customer and employee data could be exposed, violating GDPR and other data protection regulations, leading to legal and financial penalties. The ability to execute arbitrary PHP code also enables attackers to install backdoors, ransomware, or use the compromised server as a launchpad for further attacks. Organizations with public-facing WordPress sites using the Tiny Bootstrap Elements Light plugin are particularly vulnerable. The high severity and unauthenticated nature of the exploit increase the likelihood of targeted attacks or opportunistic scanning by automated tools. This threat also impacts hosting providers and managed service providers supporting WordPress clients, potentially affecting multiple customers simultaneously.

Mitigation Recommendations

Immediate mitigation steps include disabling or uninstalling the Tiny Bootstrap Elements Light plugin until a secure patch is released. Organizations should monitor official vendor channels and WordPress plugin repositories for updates addressing this vulnerability. Implement strict file upload controls to prevent unauthorized PHP file uploads, including MIME type validation, file extension whitelisting, and scanning uploaded files for malicious content. Deploy Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit LFI vulnerabilities, particularly targeting the 'language' parameter in HTTP requests. Conduct thorough security audits of WordPress installations to identify and remediate other potential vulnerabilities. Employ least privilege principles for web server and PHP execution environments to limit the impact of any successful exploitation. Regularly back up website data and configurations to enable rapid recovery in case of compromise. Educate web administrators on secure plugin management and the risks of outdated or untrusted plugins. Finally, consider implementing runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-04T14:15:12.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db52afa473ffe031e44804

Added to database: 9/30/2025, 3:46:55 AM

Last enriched: 10/7/2025, 11:34:58 AM

Last updated: 11/12/2025, 4:52:47 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats