CVE-2025-49370
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Lymcoin lymcoin allows PHP Local File Inclusion.This issue affects Lymcoin: from n/a through <= 1.3.12.
Mitigating Controls (NIST 800-53 r5)AI
Directly validates user-supplied filenames prior to PHP include/require operations, preventing local file inclusion exploitation in the Lymcoin theme.
Remediates the specific improper filename control flaw in Lymcoin versions through <=1.3.12 by identifying, patching, and verifying fixes.
Enforces PHP configuration settings like open_basedir and disabling allow_url_include to restrict file access paths exploited in this LFI vulnerability.
Security SummaryAI
CVE-2025-49370 is an Improper Control of Filename for Include/Require Statement vulnerability, described as a PHP Remote File Inclusion issue but enabling PHP Local File Inclusion (CWE-98), in the Lymcoin WordPress theme developed by AncoraThemes. The vulnerability affects all versions of Lymcoin from n/a through 1.3.12.
The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), though it demands high attack complexity (AC:H) with unchanged scope (S:U). Successful exploitation yields high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), earning a CVSS v3.1 base score of 8.1 and allowing remote unauthenticated attackers to perform local file inclusion.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/lymcoin/vulnerability/wordpress-lymcoin-theme-1-3-12-local-file-inclusion-vulnerability?_s_id=cve. The vulnerability was published on 2025-12-18T08:15:51.427.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation of public-facing WordPress theme (T1190) enables local file inclusion, facilitating collection of data from local system files (T1005).