Cyber Posture

CVE-2025-25141

High

Published: 07 February 2025

Published
07 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0113 78.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-25141 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the zankover Fami Sales Popup WordPress plugin (fami-sales-popup). This issue affects all versions from n/a through 2.0.0. The vulnerability carries a CVSS v3.1 base score of 7.5 (High), with a network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), required user interaction (UI:R), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H).

Attackers can exploit this vulnerability remotely without authentication by tricking a user into performing an action that triggers the flawed include/require statement, such as via a crafted request or input. Given the local file inclusion nature, successful exploitation could allow attackers to include and potentially execute arbitrary local PHP files on the server, leading to sensitive data disclosure, code execution, or server compromise depending on the included files and server configuration.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/fami-sales-popup/vulnerability/wordpress-fami-sales-popup-plugin-2-0-0-local-file-inclusion-vulnerability?_s_id=cve details the vulnerability in the Fami Sales Popup plugin version 2.0.0 and provides associated mitigation guidance for WordPress administrators.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

LFI vulnerability in public-facing WordPress plugin directly enables T1190 (exploiting public-facing apps via crafted requests) and T1005 (arbitrary local file inclusion for data disclosure or execution of local PHP files).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References