CVE-2025-59550
Published: 22 October 2025
Description
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Security Summary
CVE-2025-59550 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the designervily Xcare WordPress theme. This issue affects Xcare versions from n/a through less than 6.5. The vulnerability was published on 2025-10-22T15:15:53.850 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network, though it demands high attack complexity. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling attackers to include and execute local PHP files on the server.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/xcare/vulnerability/wordpress-xcare-theme-6-5-local-file-inclusion-vulnerability?_s_id=cve details this Local File Inclusion vulnerability in the Xcare WordPress theme, noting it affects versions prior to 6.5. Mitigation requires updating to Xcare version 6.5 or later.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables unauthenticated remote exploitation (T1190) for file/directory discovery (T1083) and collection of data from arbitrary local system files (T1005), leading to sensitive information disclosure.