CVE-2025-22708
Published: 08 January 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Mitech mitech allows PHP Local File Inclusion.This issue affects Mitech: from n/a through <= 2.3.4.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates improper control of filenames in PHP include/require statements by validating user inputs to prevent local file inclusion.
Requires timely remediation of the specific LFI vulnerability in Mitech WordPress theme versions through <=2.3.4 via patching.
Restricts filenames or paths supplied to PHP include/require to only authorized values, blocking exploitation of the LFI vulnerability.
Security SummaryAI
CVE-2025-22708 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Local File Inclusion (CWE-98), affecting the ThemeMove Mitech WordPress theme. The issue impacts all versions from n/a through 2.3.4. Published on 2026-01-08T10:15:47.600, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated remote attackers can exploit this vulnerability over the network without requiring user interaction, though exploitation demands high attack complexity. Successful attacks enable high-impact compromises of confidentiality, integrity, and availability, allowing inclusion of local files on the affected server.
The Patchstack advisory provides details on this Local File Inclusion vulnerability in the Mitech theme version 2.3.4 and outlines mitigation steps: https://patchstack.com/database/Wordpress/Theme/mitech/vulnerability/wordpress-mitech-theme-2-3-4-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a critical unauthenticated remote code execution via local file inclusion in a public-facing WordPress theme, directly mapping to exploitation of public-facing applications.