Cyber Posture

CVE-2025-58945

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes EcoGrow ecogrow allows PHP Local File Inclusion.This issue affects EcoGrow: from n/a through <= 1.7.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring identification, reporting, and correction of the specific PHP Local File Inclusion flaw in the EcoGrow WordPress theme up to version 1.7.

prevent

Enforces validation of filenames in PHP include/require statements to block malicious path inputs enabling Local File Inclusion exploitation.

detectrespond

Scans WordPress themes for vulnerabilities like CVE-2025-58945, enabling detection and risk-based remediation before exploitation.

Security SummaryAI

CVE-2025-58945 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, which enables PHP Local File Inclusion in the axiomthemes EcoGrow WordPress theme. This flaw affects EcoGrow versions from n/a through 1.7 and is associated with CWE-98.

The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating that unauthenticated attackers can exploit it remotely over the network with no user interaction required, though it demands high attack complexity. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling attackers to include and execute local files on the server.

Patchstack's advisory (https://patchstack.com/database/Wordpress/Theme/ecogrow/vulnerability/wordpress-ecogrow-theme-1-7-local-file-inclusion-vulnerability?_s_id=cve) documents the Local File Inclusion issue specifically in the WordPress EcoGrow theme up to version 1.7.

Details

CWE(s)

Affected Products

axiomthemes
ecogrow
≤ 1.7

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a PHP Local/Remote File Inclusion in a public-facing WordPress theme, directly exploited via T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References