CVE-2025-58708
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes 777 triple-seven allows PHP Local File Inclusion.This issue affects 777: from n/a through <= 1.3.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the PHP LFI flaw in the WordPress theme by requiring timely identification, reporting, and correction through patching affected versions up to 1.3.
Requires validating filenames supplied to PHP include/require statements to ensure they conform to expected formats and paths, preventing local file inclusion exploitation.
Monitors and scans for vulnerabilities like CVE-2025-58708 in WordPress themes, enabling detection and prioritization for remediation.
Security SummaryAI
CVE-2025-58708 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the axiomthemes 777 (triple-seven) WordPress theme. This issue affects all versions of the theme up to and including 1.3. Published on 2025-12-18, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote, unauthenticated attackers with network access can exploit this vulnerability despite its high attack complexity and lack of required privileges or user interaction. Exploitation allows local file inclusion, potentially leading to high-impact unauthorized access to sensitive data (confidentiality), modification of system resources (integrity), and disruption of services (availability).
The Patchstack advisory provides details on this WordPress theme vulnerability at https://patchstack.com/database/Wordpress/Theme/triple-seven/vulnerability/wordpress-777-theme-1-3-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
This is a local file inclusion vulnerability in a public-facing WordPress theme, directly enabling exploitation of public-facing applications for unauthorized access, data disclosure, and potential further impacts.