PHP CVE-2025-49256

| EUVD-2025-28288 HIGH
PHP Remote File Inclusion (CWE-98)
2025-06-17 [email protected]
8.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-28288
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
CVE Published
Jun 17, 2025 - 15:15 nvd
HIGH 8.1

DescriptionNVD

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Sapa allows PHP Local File Inclusion. This issue affects Sapa: from n/a through 1.1.14.

AnalysisAI

PHP Local File Inclusion (LFI) vulnerability in thembay Sapa that allows unauthenticated remote attackers to include and execute arbitrary PHP files through improper input validation on filename parameters in include/require statements. Affected versions range from an unspecified baseline through version 1.1.14. With a CVSS score of 8.1 and network-accessible attack vector, this vulnerability enables confidentiality, integrity, and availability compromise, though exploitation requires high attack complexity (AC:H) suggesting non-trivial preconditions.

Technical ContextAI

The vulnerability stems from CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), a class of defects where PHP applications fail to properly sanitize or validate user-supplied input before passing it to include(), require(), include_once(), or require_once() functions. The thembay Sapa product (a PHP-based application, likely a WordPress theme or plugin given the vendor naming convention) does not adequately filter or whitelist filenames, allowing attackers to traverse directory structures or reference remote URLs (if allow_url_include is enabled) to load malicious PHP code. The LFI designation indicates local file inclusion rather than remote file inclusion, meaning the attack leverages files already present on the target server or accessible through directory traversal sequences (../ payloads) rather than remote URLs, though RFI is also possible depending on PHP configuration.

RemediationAI

Immediate Actions:

  1. Upgrade thembay Sapa to a patched version beyond 1.1.14 as soon as available from the vendor.
  2. If patched version is unavailable, disable the Sapa plugin/theme or restrict access to affected pages via .htaccess or WAF rules.
  3. Apply input validation: ensure all user-supplied parameters passed to include/require are validated against a whitelist of allowed filenames; reject any input containing directory traversal sequences (../, .., %, null bytes) or remote URLs.
  4. Disable PHP's allow_url_include directive (set to Off in php.ini) to mitigate remote file inclusion variants.
  5. Monitor web server logs for suspicious include/require patterns (e.g., LFI payloads like /etc/passwd, /var/www/html/wp-config.php, or repeated ../ sequences).
  6. Apply principle of least privilege: run PHP-FPM/Apache under a dedicated unprivileged user account to limit file access.

Vendor Patch: Check thembay's official website, GitHub repository, or WordPress plugin repository for version 1.1.15 or later.

Share

CVE-2025-49256 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy