CVE-2025-50003
Published: 22 January 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Amuli amuli allows PHP Local File Inclusion.This issue affects Amuli: from n/a through <= 2.3.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by identifying, prioritizing, and applying patches or updates to the vulnerable Amuli WordPress theme.
Validates filenames supplied to PHP include/require statements to block malicious local file inclusion paths.
Enforces secure PHP configuration settings such as allow_url_include=Off and open_basedir restrictions to limit file inclusion capabilities.
Security SummaryAI
CVE-2025-50003 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and described as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Amuli WordPress theme developed by axiomthemes, impacting all versions from n/a through 2.3.0. The vulnerability was published on 2026-01-22 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated remote attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing attackers to include and potentially execute local files on the server.
Patchstack's advisory at https://patchstack.com/database/Wordpress/Theme/amuli/vulnerability/wordpress-amuli-theme-2-3-0-local-file-inclusion-vulnerability?_s_id=cve documents the Local File Inclusion vulnerability in the Amuli WordPress theme version 2.3.0.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation of public-facing WordPress theme (T1190) enables local file inclusion for reading sensitive local files (T1005), potentially leading to code execution or credential access.