PHP CVE-2025-49253

| EUVD-2025-18646 HIGH
PHP Remote File Inclusion (CWE-98)
2025-06-17 [email protected]
8.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18646
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
CVE Published
Jun 17, 2025 - 15:15 nvd
HIGH 8.1

DescriptionNVD

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Lasa allows PHP Local File Inclusion. This issue affects Lasa: from n/a through 1.1.

AnalysisAI

PHP Local File Inclusion (LFI) vulnerability in thembay Lasa versions up to 1.1, caused by improper control of filename parameters in PHP include/require statements. This allows unauthenticated remote attackers to include and execute arbitrary local files on the server, potentially leading to remote code execution, information disclosure, and system compromise. The high CVSS score of 8.1 reflects the severity of this vulnerability, though the high attack complexity (AC:H) suggests exploitation may require specific environmental conditions or knowledge of the target system.

Technical ContextAI

The vulnerability stems from CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), a classic PHP security flaw where user-supplied input is passed unsanitized to PHP's include(), require(), include_once(), or require_once() functions. In thembay Lasa, likely a WordPress theme or plugin (vendor: thembay), an attacker can manipulate filename parameters to load arbitrary files from the local filesystem. While initially described as 'PHP Remote File Inclusion,' the description clarifies this is actually a Local File Inclusion (LFI) vulnerability. An attacker could exploit this to read sensitive files (e.g., wp-config.php, /etc/passwd), or if combined with file upload or log poisoning techniques, achieve remote code execution. The affected product is thembay Lasa versions from an unspecified baseline through version 1.1.

RemediationAI

Upgrade thembay Lasa to a version beyond 1.1 (specific patched version not provided in CVE description; check thembay's official repository or vendor advisories for the next available release).; priority: Critical

Share

CVE-2025-49253 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy