CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5DescriptionNVD
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LoftOcean CozyStay allows PHP Local File Inclusion. This issue affects CozyStay: from n/a through n/a.
AnalysisAI
PHP Local/Remote File Inclusion (LFI/RFI) vulnerability in LoftOcean CozyStay that allows unauthenticated remote attackers to include and execute arbitrary files through improper control of filename parameters in PHP include/require statements. The vulnerability affects CozyStay with a CVSS score of 8.1 (High severity), enabling attackers to read sensitive files, execute arbitrary code, or compromise system integrity without requiring user interaction or authentication.
Technical ContextAI
This vulnerability stems from CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), a classic PHP security flaw where user-supplied input is passed unsanitized to PHP's include(), require(), include_once(), or require_once() functions. CozyStay, a property management/booking system by LoftOcean, fails to properly validate or sanitize filename parameters before using them in file inclusion statements. While classified as 'PHP Remote File Inclusion' in the CVE title, the description indicates Local File Inclusion (LFI) is the primary concern, though RFI may be possible if PHP wrappers (stream:// protocols) are enabled. The vulnerability bypasses critical security controls that should restrict includes to whitelisted paths or implement strict input validation.
RemediationAI
Immediate actions: (1) Contact LoftOcean for official security advisories and patch availability at https://loftocean.com or support channels; (2) Implement network segmentation to restrict direct internet access to CozyStay instances; (3) Deploy Web Application Firewall (WAF) rules to block common LFI payloads (e.g., regex patterns for '../', 'php://', 'file://', 'expect://' in request parameters); (4) Review and audit all include/require statements in CozyStay codebase for unsanitized user input. Long-term: Apply official patches from LoftOcean when released, upgrade to patched versions immediately. Mitigation: If patching is delayed, implement strict input validation using whitelisting (only allow expected filenames/directories) and disable PHP wrappers via php.ini (allow_url_include=Off, allow_url_fopen=Off).
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18523