Cyber Posture

CVE-2025-22708

High

Published: 08 January 2026

Published
08 January 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 38.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Mitech mitech allows PHP Local File Inclusion.This issue affects Mitech: from n/a through <= 2.3.4.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates improper control of filenames in PHP include/require statements by validating user inputs to prevent local file inclusion.

prevent

Requires timely remediation of the specific LFI vulnerability in Mitech WordPress theme versions through <=2.3.4 via patching.

prevent

Restricts filenames or paths supplied to PHP include/require to only authorized values, blocking exploitation of the LFI vulnerability.

Security SummaryAI

CVE-2025-22708 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Local File Inclusion (CWE-98), affecting the ThemeMove Mitech WordPress theme. The issue impacts all versions from n/a through 2.3.4. Published on 2026-01-08T10:15:47.600, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated remote attackers can exploit this vulnerability over the network without requiring user interaction, though exploitation demands high attack complexity. Successful attacks enable high-impact compromises of confidentiality, integrity, and availability, allowing inclusion of local files on the affected server.

The Patchstack advisory provides details on this Local File Inclusion vulnerability in the Mitech theme version 2.3.4 and outlines mitigation steps: https://patchstack.com/database/Wordpress/Theme/mitech/vulnerability/wordpress-mitech-theme-2-3-4-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

Affected Products

thememove
mitech
≤ 2.3.4

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a critical unauthenticated remote code execution via local file inclusion in a public-facing WordPress theme, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References