Cyber Posture

CVE-2025-59550

High

Published: 22 October 2025

Published
22 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-59550 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the designervily Xcare WordPress theme. This issue affects Xcare versions from n/a through less than 6.5. The vulnerability was published on 2025-10-22T15:15:53.850 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network, though it demands high attack complexity. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling attackers to include and execute local PHP files on the server.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/xcare/vulnerability/wordpress-xcare-theme-6-5-local-file-inclusion-vulnerability?_s_id=cve details this Local File Inclusion vulnerability in the Xcare WordPress theme, noting it affects versions prior to 6.5. Mitigation requires updating to Xcare version 6.5 or later.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

LFI vulnerability in public-facing WordPress theme enables unauthenticated remote exploitation (T1190) for file/directory discovery (T1083) and collection of data from arbitrary local system files (T1005), leading to sensitive information disclosure.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References