CVE-2025-58948
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Aromatica aromatica allows PHP Local File Inclusion.This issue affects Aromatica: from n/a through <= 1.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-58948 by identifying, reporting, and correcting the improper filename control flaw in the Aromatica WordPress theme, preventing exploitation through patching or updates.
Requires validation of filenames and paths used in PHP include/require statements, directly countering the local file inclusion vulnerability in the Aromatica theme.
Restricts information inputs such as file paths to whitelisted safe values, preventing attackers from supplying malicious filenames to exploit the PHP file inclusion flaw.
Security SummaryAI
CVE-2025-58948 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the Aromatica WordPress theme developed by axiomthemes. The issue impacts all versions of Aromatica up to and including 1.8, with no lower bound specified. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.
Remote, unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to include and execute arbitrary local files as PHP code, leading to server compromise such as remote code execution or data exfiltration.
The primary advisory is available from Patchstack at https://patchstack.com/database/Wordpress/Theme/aromatica/vulnerability/wordpress-aromatica-theme-1-8-local-file-inclusion-vulnerability?_s_id=cve, which details the vulnerability in the WordPress Aromatica theme version 1.8. Practitioners should consult this for specific patch information or upgrade guidance.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote file inclusion flaw in a public-facing WordPress theme, enabling unauthenticated attackers to include and execute arbitrary local files as PHP code for server compromise (RCE), directly mapping to T1190: Exploit Public-Facing Application.