CVE-2025-58933
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Anubis anubis allows PHP Local File Inclusion.This issue affects Anubis: from n/a through <= 1.25.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper filename control in PHP include/require by requiring validation of user-supplied filenames to prevent local file inclusion.
Requires timely remediation of the known flaw in Anubis WordPress theme versions through n/a to 1.25 by applying patches or upgrades.
Enforces secure configuration settings for PHP environments, such as disabling allow_url_include and restricting open_basedir, to limit the impact of file inclusion vulnerabilities.
Security SummaryAI
CVE-2025-58933 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Anubis WordPress theme by axiomthemes. This issue affects Anubis versions from n/a through 1.25 inclusive. Published on 2025-12-18, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.
An unauthenticated remote attacker can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing arbitrary local file inclusion on the server.
The Patchstack advisory documents this Local File Inclusion vulnerability specifically in WordPress Anubis theme version 1.25, available at https://patchstack.com/database/Wordpress/Theme/anubis/vulnerability/wordpress-anubis-theme-1-25-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables exploitation of public-facing application (T1190) and facilitates arbitrary local file reads for file/directory discovery (T1083) and data collection from local system (T1005).