CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Case Themes Case Theme User allows PHP Local File Inclusion.This issue affects Case Theme User: from n/a before 1.0.4.
Analysis
Local file inclusion in Case Themes Case Theme User WordPress plugin (versions prior to 1.0.4) enables unauthenticated remote attackers to include arbitrary local files via PHP require/include statements. Successful exploitation requires high attack complexity and user interaction, but grants full compromise of confidentiality, integrity, and availability. Attackers may read sensitive configuration files, execute malicious code if file upload exists, or escalate to remote code execution through log poisoning techniques. No public exploit identified at time of analysis.
Technical Context
CWE-98 PHP file inclusion flaw stems from improper sanitization of file paths in require/include statements. The CVSS vector indicates network-accessible attack surface (AV:N) requiring user interaction (UI:R) and high complexity (AC:H), suggesting exploitation depends on specific conditions like user-triggered actions or race conditions. CPE identifies Case Themes Case Theme User WordPress plugin as affected component.
Affected Products
Case Themes Case Theme User WordPress plugin, vendor Case Themes, versions prior to 1.0.4. CPE: cpe:2.3:a:case_themes:case_theme_user:*:*:*:*:*:*:*:* (all versions before 1.0.4 vulnerable).
Remediation
Vendor-released patch: upgrade Case Theme User plugin to version 1.0.4 or later, which remediates the PHP file inclusion vulnerability. Administrators should update immediately through WordPress plugin management interface or manual installation. If immediate patching is not feasible, deactivate and remove Case Theme User plugin until upgrade is completed. Implement web application firewall rules to block directory traversal patterns (../, %2e%2e/) and null byte injection attempts targeting plugin endpoints. Review server logs for suspicious file access patterns indicating exploitation attempts. Full technical details available at Patchstack advisory: https://patchstack.com/database/wordpress/plugin/case-theme-user/vulnerability/wordpress-case-theme-user-1-0-4-local-file-inclusion-vulnerability?_s_id=cve
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209401