Cyber Posture

CVE-2025-58948

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Aromatica aromatica allows PHP Local File Inclusion.This issue affects Aromatica: from n/a through <= 1.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-58948 by identifying, reporting, and correcting the improper filename control flaw in the Aromatica WordPress theme, preventing exploitation through patching or updates.

prevent

Requires validation of filenames and paths used in PHP include/require statements, directly countering the local file inclusion vulnerability in the Aromatica theme.

prevent

Restricts information inputs such as file paths to whitelisted safe values, preventing attackers from supplying malicious filenames to exploit the PHP file inclusion flaw.

Security SummaryAI

CVE-2025-58948 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the Aromatica WordPress theme developed by axiomthemes. The issue impacts all versions of Aromatica up to and including 1.8, with no lower bound specified. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.

Remote, unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to include and execute arbitrary local files as PHP code, leading to server compromise such as remote code execution or data exfiltration.

The primary advisory is available from Patchstack at https://patchstack.com/database/Wordpress/Theme/aromatica/vulnerability/wordpress-aromatica-theme-1-8-local-file-inclusion-vulnerability?_s_id=cve, which details the vulnerability in the WordPress Aromatica theme version 1.8. Practitioners should consult this for specific patch information or upgrade guidance.

Details

CWE(s)

Affected Products

axiomthemes
aromatica
≤ 1.8

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote file inclusion flaw in a public-facing WordPress theme, enabling unauthenticated attackers to include and execute arbitrary local files as PHP code for server compromise (RCE), directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References