Cyber Posture

CVE-2025-58929

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Pantry pantry allows PHP Local File Inclusion.This issue affects Pantry: from n/a through <= 1.4.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires identification, reporting, and correction of system flaws like CVE-2025-58929, directly mitigating the LFI vulnerability through patching the affected WordPress Pantry theme.

prevent

SI-10 mandates validation of information inputs, directly countering the improper control of filenames in PHP include/require statements exploited in this PHP LFI vulnerability.

prevent

CM-6 enforces secure configuration settings for components like PHP (e.g., open_basedir restrictions, disable_functions), limiting the impact and exploitation of file inclusion vulnerabilities.

Security SummaryAI

CVE-2025-58929 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, which enables PHP Local File Inclusion in the axiomthemes Pantry WordPress theme. This issue affects Pantry versions from n/a through 1.4. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

Unauthenticated attackers accessible over the network can exploit this vulnerability, though it requires high attack complexity and no user interaction. Successful exploitation allows high-level impacts on confidentiality, integrity, and availability, typically through local file inclusion to read sensitive server files or potentially execute arbitrary code if chained with other conditions.

The Patchstack advisory (https://patchstack.com/database/Wordpress/Theme/pantry/vulnerability/wordpress-pantry-theme-1-4-local-file-inclusion-vulnerability?_s_id=cve) documents this Local File Inclusion vulnerability specifically in WordPress Pantry theme version 1.4.

Details

CWE(s)

Affected Products

axiomthemes
pantry
≤ 1.4

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

CVE-2025-58929 is a Local File Inclusion vulnerability in a public-facing WordPress theme, directly enabling T1190 (Exploit Public-Facing Application) for initial access and T1005 (Data from Local System) for reading sensitive local files.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References