CVE-2025-58893
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Alright alright allows PHP Local File Inclusion.This issue affects Alright: from n/a through <= 1.6.1.
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of software flaws like the PHP local file inclusion vulnerability in the Alright WordPress theme.
Enforces validation of inputs to PHP include/require statements to block malicious filenames enabling local file inclusion.
Conducts vulnerability scanning to identify PHP file inclusion flaws in web applications like the vulnerable Alright theme.
Security SummaryAI
CVE-2025-58893 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the axiomthemes Alright WordPress theme. This issue affects Alright versions from n/a through 1.6.1. Published on 2025-12-18, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote attackers with network access can exploit this vulnerability despite requiring high attack complexity and no privileges or user interaction. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling local file disclosure or execution of arbitrary code through manipulated include/require statements in the PHP program.
Mitigation details are provided in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/alright/vulnerability/wordpress-alright-theme-1-6-1-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing WordPress theme enables remote exploitation via file inclusion for arbitrary code execution and local file disclosure.