CVE-2025-32595

| EUVD-2025-17510 HIGH
2025-06-09 [email protected]
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17510
CVE Published
Jun 09, 2025 - 16:15 nvd
HIGH 8.1

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Krowd allows PHP Local File Inclusion. This issue affects Krowd: from n/a through 1.4.1.

Analysis

PHP Local File Inclusion (LFI) vulnerability in Gavias Krowd versions up to 1.4.1 that allows unauthenticated remote attackers to include and execute arbitrary local files on the server. The vulnerability stems from improper control of filename parameters in PHP include/require statements (CWE-98), enabling attackers to read sensitive files or execute malicious code with high complexity but high impact including confidentiality, integrity, and availability compromise. No public exploit code or active exploitation reports are currently available in standard vulnerability databases, but the high CVSS score (8.1) and network-accessible attack vector indicate significant risk for unpatched installations.

Technical Context

The vulnerability exists in the Gavias Krowd theme/plugin framework for PHP-based content management systems. CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program) describes the root cause: dynamic file inclusion where user-supplied input is passed directly to PHP include(), require(), include_once(), or require_once() functions without proper validation or sanitization. An attacker can manipulate filename parameters to include local files (LFI) by using path traversal sequences (e.g., '../../../etc/passwd') or PHP wrappers (php://filter/, php://input) to read sensitive configuration files, access source code, or achieve remote code execution if combined with file upload functionality or log injection techniques. The attack surface is the web-facing parameters of Krowd components that handle file inclusion logic.

Affected Products

Krowd (1.4.1 and earlier)

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +40
POC: 0

Share

CVE-2025-32595 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy