CVE-2025-48290
Published: 06 November 2025
Description
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Security Summary
CVE-2025-48290 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (CWE-98), affecting the Kinsley WordPress theme developed by bslthemes. This flaw impacts Kinsley versions from n/a through 3.4.4 and was published on 2025-11-06.
The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation by unauthenticated attackers over the network with high attack complexity and no user interaction. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially enabling local file disclosure or manipulation through improper handling of include/require statements.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/kinsley/vulnerability/wordpress-kinsley-theme-3-4-4-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Public-facing WordPress theme vulnerability enables unauthenticated remote exploitation (T1190). LFI allows arbitrary local file inclusion, facilitating data collection from local system (T1005) and file/directory discovery (T1083).