CVSS VectorNVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3DescriptionNVD
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Avaz allows PHP Local File Inclusion. This issue affects Avaz: from n/a through 2.8.
AnalysisAI
PHP Local File Inclusion (LFI) vulnerability in the snstheme Avaz plugin that allows unauthenticated remote attackers to include arbitrary PHP files via improper control of filename parameters in include/require statements. The vulnerability affects Avaz versions through 2.8 and has a CVSS score of 8.1 (high severity), enabling attackers to execute arbitrary code, read sensitive files, and compromise system integrity without requiring authentication or user interaction.
Technical ContextAI
The vulnerability stems from CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Program), a critical PHP-specific weakness where user-supplied input is passed directly to PHP include() or require() functions without proper validation or sanitization. In the snstheme Avaz plugin, the root cause involves insufficient input filtering on filename parameters, allowing attackers to traverse the filesystem or potentially include remote files (RFI-like behavior despite being classified as LFI). The affected product is snstheme's Avaz theme/plugin for PHP-based web applications, likely WordPress-based given the 'snstheme' vendor designation. The improper filename control permits path traversal sequences (e.g., '../../../') or null byte injection (in older PHP versions) to break out of intended directories and access arbitrary files on the server.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17485