PHP CVE-2025-49278

| EUVD-2025-17544 HIGH
PHP Remote File Inclusion (CWE-98)
2025-06-09 [email protected]
8.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17544
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
CVE Published
Jun 09, 2025 - 16:15 nvd
HIGH 8.1

DescriptionNVD

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Unfoldwp Blogty allows PHP Local File Inclusion. This issue affects Blogty: from n/a through 1.0.11.

AnalysisAI

PHP Local File Inclusion (LFI) vulnerability in Unfoldwp Blogty plugin versions up to 1.0.11 that allows unauthenticated remote attackers to include and execute arbitrary local files through improper control of filename parameters in PHP include/require statements. The vulnerability has a CVSS score of 8.1 (High), indicating potential for confidentiality, integrity, and availability compromise. Active exploitation status and EPSS probability are critical factors in determining real-world risk severity.

Technical ContextAI

This vulnerability exploits improper input validation in PHP file inclusion mechanisms (include/require functions), classified under CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program). The Unfoldwp Blogty WordPress plugin fails to adequately sanitize or validate user-supplied input before passing it to PHP's include() or require() functions. Unlike Remote File Inclusion (RFI), this LFI variant allows inclusion of files already present on the server filesystem, potentially including configuration files containing credentials, application source code, or session data. The attack vector is Network with High complexity (AC:H), suggesting the exploitation requires specific conditions such as knowledge of file paths or special request formatting, but no authentication (PR:N) or user interaction (UI:N) is required.

RemediationAI

  1. Immediate: Update Unfoldwp Blogty plugin to version 1.0.12 or later (patch version should be confirmed in official Unfoldwp/WordPress Plugin Directory repository). 2) Verification: Check WordPress admin dashboard under Plugins for Blogty and confirm current version; apply updates via Plugins > Updates if available. 3) Workaround (temporary): Disable the Blogty plugin if update is unavailable and alternative themes are deployable; this eliminates attack surface until patched. 4) Detection: Review web server access logs (Apache/Nginx) for suspicious include/require parameter manipulation or path traversal patterns (e.g., '../', '..\', 'php://filter/', 'phar://' in query strings or POST data) targeting Blogty-related endpoints. 5) Long-term: Implement Web Application Firewall (WAF) rules to block common LFI payloads and monitor file inclusion patterns.

Share

CVE-2025-49278 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy