Skip to main content

CVE-2025-9991: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in migli Tiny Bootstrap Elements Light

High
VulnerabilityCVE-2025-9991cvecve-2025-9991cwe-98
Published: Tue Sep 30 2025 (09/30/2025, 03:35:31 UTC)
Source: CVE Database V5
Vendor/Project: migli
Product: Tiny Bootstrap Elements Light

Description

The Tiny Bootstrap Elements Light plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.3.34 via the 'language' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

AI-Powered Analysis

AILast updated: 09/30/2025, 04:01:01 UTC

Technical Analysis

CVE-2025-9991 is a high-severity vulnerability affecting the Tiny Bootstrap Elements Light plugin for WordPress, specifically all versions up to and including 4.3.34. The vulnerability is classified as CWE-98, which involves improper control of filenames used in include or require statements in PHP programs. This manifests as a Local File Inclusion (LFI) vulnerability via the 'language' parameter in the plugin. An unauthenticated attacker can exploit this flaw by manipulating the 'language' parameter to include arbitrary .php files from the server. This can lead to the execution of arbitrary PHP code, which may allow attackers to bypass access controls, access sensitive data, or achieve full remote code execution if they can upload malicious .php files to the server. The vulnerability does not require any authentication or user interaction, but the complexity of exploitation is rated as high due to the need to have or upload malicious PHP files on the server. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and no privileges required. Although no public exploits are currently known in the wild, the potential for severe damage is significant given the widespread use of WordPress and the plugin in question. The lack of available patches at the time of publication increases the risk for affected installations.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the Tiny Bootstrap Elements Light plugin installed. Successful exploitation can lead to unauthorized access to sensitive corporate or customer data, defacement of websites, or full server compromise. This can result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions. Organizations in sectors such as finance, healthcare, e-commerce, and government are particularly vulnerable due to the sensitive nature of their data and the criticality of their online presence. The ability to execute arbitrary PHP code remotely without authentication significantly raises the threat level, potentially enabling attackers to establish persistent backdoors or pivot within internal networks. Given the high prevalence of WordPress in Europe and the plugin’s usage, the threat could affect a broad range of organizations, from SMEs to large enterprises.

Mitigation Recommendations

Immediate mitigation should include disabling or uninstalling the Tiny Bootstrap Elements Light plugin until a secure patch is released. Organizations should monitor official vendor channels and WordPress plugin repositories for updates addressing CVE-2025-9991. In the interim, applying Web Application Firewall (WAF) rules to block suspicious requests targeting the 'language' parameter can reduce exposure. Restricting file upload capabilities and enforcing strict file type validation on web servers can prevent attackers from uploading malicious PHP files that could be included via this vulnerability. Additionally, implementing least privilege principles for web server file permissions can limit the impact of potential exploitation. Regularly auditing WordPress plugins for vulnerabilities and maintaining an up-to-date inventory of installed components will help in early detection and response. Network segmentation and monitoring for unusual PHP execution patterns can aid in identifying exploitation attempts. Finally, organizations should prepare incident response plans specific to web application compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-04T14:15:12.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db52afa473ffe031e44804

Added to database: 9/30/2025, 3:46:55 AM

Last enriched: 9/30/2025, 4:01:01 AM

Last updated: 10/1/2025, 2:28:15 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats