CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3DescriptionNVD
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme BRW allows PHP Local File Inclusion. This issue affects BRW: from n/a through 1.8.6.
AnalysisAI
PHP Local File Inclusion (LFI) vulnerability in ovatheme BRW versions up to 1.8.6, stemming from improper control of filename parameters in include/require statements. An authenticated attacker with low privileges can exploit this to read arbitrary files from the server filesystem, potentially gaining access to sensitive configuration files, source code, or credentials. The vulnerability requires network access and authenticated user status (CWE-98 improper input validation on file paths), with a CVSS score of 7.5 indicating high confidentiality and integrity impact.
Technical ContextAI
This vulnerability exploits CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), a classic PHP security flaw where user-supplied input is passed directly to include(), require(), include_once(), or require_once() functions without proper sanitization or validation. The ovatheme BRW plugin likely accepts file path parameters (potentially via GET/POST requests) and uses them in include/require statements, allowing attackers to traverse directories using path traversal sequences (../) or access arbitrary local files. The affected product is identified as ovatheme BRW, a WordPress theme/plugin component, with vulnerability affecting versions from initial release through 1.8.6. The root cause involves insufficient input validation on user-controlled filename/path parameters before they are passed to PHP's file inclusion functions.
RemediationAI
Upgrade ovatheme BRW to version 1.8.7 or later (if available); details: Contact ovatheme for security updates or check WordPress.org plugin repository for patched versions beyond 1.8.6 Workaround: Restrict access to BRW functionality; details: Limit plugin access to trusted administrators only; use WordPress user role management to minimize exposed authenticated users who can trigger the vulnerability Workaround: Implement Web Application Firewall (WAF) rules; details: Deploy WAF rules to detect and block path traversal patterns (../, ..\, etc.) in HTTP requests targeting BRW parameters Mitigation: Server-level hardening; details: Implement PHP open_basedir directive to restrict file access scope; disable dangerous PHP functions like include/require on untrusted input via suhosin or similar patches Detection: Monitor for exploitation attempts; details: Search application and web server logs for suspicious include/require parameter patterns, path traversal sequences in BRW-related requests, and unusual file access patterns
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17256