CVE-2025-26932
Published: 25 February 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-26932 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion, in the QuantumCloud ChatBot WordPress plugin. It enables PHP Local File Inclusion and affects all versions up to and including 6.3.5.
The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H). An attacker with low privileges can exploit it over the network, requiring high attack complexity but no user interaction. Successful exploitation grants high impacts on confidentiality, integrity, and availability.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/chatbot/vulnerability/wordpress-wpbot-plugin-6-3-5-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CVE describes a network-exploitable vulnerability (AV:N) in a public-facing WordPress plugin allowing local/remote file inclusion with high impact, directly enabling initial access via exploitation of public-facing applications.