CVE-2025-58896
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Otaku otaku allows PHP Local File Inclusion.This issue affects Otaku: from n/a through <= 1.8.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the improper filename control in PHP include/require by validating user-supplied inputs to prevent local file inclusion attacks.
Ensures timely identification, reporting, and patching of the specific LFI vulnerability in the Otaku WordPress theme versions through 1.8.0.
Enforces secure PHP and web server configuration settings, such as open_basedir restrictions, to limit the scope of potential file inclusions.
Security SummaryAI
CVE-2025-58896 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion, affecting the AncoraThemes Otaku WordPress theme. This flaw impacts all versions of Otaku from n/a through 1.8.0. Published on 2025-12-18, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.
The vulnerability can be exploited by unauthenticated attackers over the network, requiring no user interaction but high attack complexity. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing attackers to perform local file inclusion, potentially resulting in arbitrary file reads, sensitive data exposure, or remote code execution depending on server configuration.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/otaku/vulnerability/wordpress-otaku-theme-1-8-0-local-file-inclusion-vulnerability?_s_id=cve, which covers the Local File Inclusion vulnerability in the Otaku WordPress theme version 1.8.0.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Public-facing WordPress theme vulnerability enables unauthenticated remote exploitation (T1190) via improper filename control in PHP include/require, facilitating local file inclusion for arbitrary file reads from the local system (T1005) and file/directory discovery (T1083).