CVE-2025-58900
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UniTravel unitravel allows PHP Local File Inclusion.This issue affects UniTravel: from n/a through <= 1.4.2.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-58900 by requiring timely patching of the vulnerable UniTravel WordPress theme versions up to 1.4.2.
Enforces validation of filenames used in PHP include/require statements, preventing local file inclusion exploitation.
Establishes secure PHP configuration settings like open_basedir to restrict file access paths exploitable by the LFI vulnerability.
Security SummaryAI
CVE-2025-58900 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, in the AncoraThemes UniTravel WordPress theme (unitravel). It enables PHP Local File Inclusion and affects all versions from n/a through 1.4.2. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-98.
Unauthenticated remote attackers can exploit this vulnerability over the network without requiring user interaction, though it demands high attack complexity. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially enabling local file inclusion to read sensitive files or execute arbitrary code if local PHP files are accessible.
The Patchstack advisory provides details on this WordPress UniTravel theme 1.4.2 local file inclusion vulnerability, including mitigation guidance, available at https://patchstack.com/database/Wordpress/Theme/unitravel/vulnerability/wordpress-unitravel-theme-1-4-2-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote file inclusion flaw in a public-facing WordPress theme, directly enabling exploitation of public-facing applications without authentication.