CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3DescriptionNVD
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Lasa allows PHP Local File Inclusion. This issue affects Lasa: from n/a through 1.1.
AnalysisAI
PHP Local File Inclusion (LFI) vulnerability in thembay Lasa versions up to 1.1, caused by improper control of filename parameters in PHP include/require statements. This allows unauthenticated remote attackers to include and execute arbitrary local files on the server, potentially leading to remote code execution, information disclosure, and system compromise. The high CVSS score of 8.1 reflects the severity of this vulnerability, though the high attack complexity (AC:H) suggests exploitation may require specific environmental conditions or knowledge of the target system.
Technical ContextAI
The vulnerability stems from CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), a classic PHP security flaw where user-supplied input is passed unsanitized to PHP's include(), require(), include_once(), or require_once() functions. In thembay Lasa, likely a WordPress theme or plugin (vendor: thembay), an attacker can manipulate filename parameters to load arbitrary files from the local filesystem. While initially described as 'PHP Remote File Inclusion,' the description clarifies this is actually a Local File Inclusion (LFI) vulnerability. An attacker could exploit this to read sensitive files (e.g., wp-config.php, /etc/passwd), or if combined with file upload or log poisoning techniques, achieve remote code execution. The affected product is thembay Lasa versions from an unspecified baseline through version 1.1.
RemediationAI
Upgrade thembay Lasa to a version beyond 1.1 (specific patched version not provided in CVE description; check thembay's official repository or vendor advisories for the next available release).; priority: Critical
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18646