Cyber Posture

CVE-2025-58890

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Playful playful allows PHP Local File Inclusion.This issue affects Playful: from n/a through <= 1.19.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and timely remediation of the PHP Local File Inclusion flaw in the Playful WordPress theme to prevent exploitation.

prevent

Enforces validation of untrusted filename inputs to PHP include/require statements, blocking malicious local file paths that enable unauthorized access and code execution.

prevent

Establishes secure PHP configuration settings like open_basedir restrictions or disabling allow_url_include to limit the scope of local file inclusion attacks.

Security SummaryAI

CVE-2025-58890 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Playful WordPress theme developed by AncoraThemes, impacting all versions from n/a through 1.19.0. The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, and is associated with CWE-98.

Unauthenticated attackers can exploit this vulnerability remotely over the network without requiring user interaction, though exploitation demands high attack complexity. Successful attacks grant high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to include and execute local PHP files, leading to unauthorized file access or code execution on the target server.

Mitigation details are available in advisories such as the Patchstack database entry at https://patchstack.com/database/Wordpress/Theme/playful/vulnerability/wordpress-playful-theme-1-19-0-local-file-inclusion-vulnerability?_s_id=cve. The vulnerability was published on 2025-12-18T08:15:58.167.

Details

CWE(s)

Affected Products

ancorathemes
playful
≤ 1.19.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2025-58890 is an unauthenticated remote file inclusion vulnerability in a public-facing WordPress theme, directly enabling T1190 (Exploit Public-Facing Application) for unauthorized file access and code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References