CVE-2025-58889
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Towny towny allows PHP Local File Inclusion.This issue affects Towny: from n/a through <= 1.16.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the specific PHP Local File Inclusion flaw in Towny theme by identifying, reporting, and applying patches or updates to remediate the vulnerability.
Prevents exploitation of improper filename control in include/require statements by validating user-supplied inputs for malicious file paths.
Mitigates file inclusion risks by enforcing restrictive PHP configuration settings such as open_basedir or disabling allow_url_include to limit arbitrary file access.
Security SummaryAI
CVE-2025-58889 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion, affecting the Towny WordPress theme developed by axiomthemes. This flaw impacts Towny versions from n/a through 1.16 inclusive, stemming from CWE-98.
Unauthenticated remote attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation yields high impacts on confidentiality, integrity, and availability, as reflected in its CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/towny/vulnerability/wordpress-towny-theme-1-16-local-file-inclusion-vulnerability?_s_id=cve documents this local file inclusion vulnerability in the Towny theme version 1.16 and provides details on associated mitigations.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote Local File Inclusion (LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing application.