CVE-2025-58994
Published: 06 November 2025
Description
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Security Summary
CVE-2025-58994 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the Greenify WordPress theme by designervily. This issue impacts all versions of Greenify from n/a through 2.2. The vulnerability corresponds to CWE-98 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility and significant impacts on confidentiality, integrity, and availability.
Unauthenticated attackers (PR:N) can exploit this vulnerability over the network (AV:N) without user interaction (UI:N), though it requires high attack complexity (AC:H) and does not change scope (S:U). Successful exploitation allows local file inclusion, enabling attackers to read sensitive local files on the server and potentially achieve remote code execution if controllable PHP files are included, resulting in high impacts across confidentiality, integrity, and availability.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/greenify/vulnerability/wordpress-greenify-theme-2-2-local-file-inclusion-vulnerability?_s_id=cve, which documents the vulnerability in the Greenify WordPress theme version 2.2.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability is an exploitable flaw in a public-facing WordPress theme (T1190: Exploit Public-Facing Application), enabling local file inclusion to read sensitive local files (T1005: Data from Local System) and potentially remote code execution.