Cyber Posture

CVE-2025-53438

High

Published: 18 December 2025

Published
18 December 2025
Modified
20 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes FitLine fitline allows PHP Local File Inclusion.This issue affects FitLine: from n/a through <= 1.6.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the PHP Local File Inclusion flaw in the FitLine WordPress theme by requiring identification, reporting, and correction of the improper filename control in include/require statements.

prevent

Requires validation and error handling of user-supplied inputs used as filenames in PHP include/require statements, preventing unauthorized local file access and execution.

preventdetect

Boundary protection via web application firewalls monitors and blocks network traffic containing LFI payloads exploiting the improper filename control vulnerability.

Security SummaryAI

CVE-2025-53438 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion (CWE-98), in the axiomthemes FitLine WordPress theme. It enables PHP Local File Inclusion and affects all versions of FitLine from n/a through 1.6. The vulnerability carries a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

Unauthenticated attackers can exploit this vulnerability remotely over the network, though it requires high attack complexity and no user interaction. Exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially leading to unauthorized file access or execution via local file inclusion.

Patchstack documents this issue in their database entry for the WordPress FitLine theme, detailing the Local File Inclusion vulnerability in version 1.6.

Details

CWE(s)

Affected Products

axiomthemes
fitline
≤ 1.6

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote file inclusion flaw in a public-facing WordPress theme, directly enabling exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References