CVE-2025-53447
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Assembly assembly allows PHP Local File Inclusion.This issue affects Assembly: from n/a through <= 1.1.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-53447 by requiring timely remediation and patching of the vulnerable Assembly WordPress theme versions <=1.1.
Prevents exploitation of the PHP Local File Inclusion vulnerability by validating filename inputs used in include/require statements against malicious local paths.
Mitigates the vulnerability through secure PHP and web server configuration settings, such as open_basedir restrictions to limit accessible file paths.
Security SummaryAI
CVE-2025-53447 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and labeled as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Assembly WordPress theme developed by axiomthemes, impacting all versions from n/a through 1.1 inclusive. The vulnerability was published on 2025-12-18 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
An unauthenticated remote attacker can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing the inclusion of arbitrary local files on the affected server.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/assembly/vulnerability/wordpress-assembly-theme-1-1-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote LFI vulnerability in public-facing WordPress theme enables exploitation of public-facing application (T1190) and arbitrary local file access (T1005).