CVE-2025-59558
Published: 22 October 2025
Description
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Security Summary
CVE-2025-59558 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the ThemeMove Billey WordPress theme. This flaw affects Billey versions from n/a through those prior to 2.1.6.
Unauthenticated remote attackers can exploit the vulnerability over the network (AV:N) without user interaction (UI:N) and with no privileges required (PR:N), though it demands high attack complexity (AC:H). Exploitation within unchanged scope (S:U) can result in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), yielding a CVSS v3.1 base score of 8.1.
The Patchstack advisory details the Local File Inclusion vulnerability in the WordPress Billey theme and indicates it is addressed in version 2.1.6. Mitigation involves updating affected Billey installations to 2.1.6 or later.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
LFI in public-facing WordPress theme enables T1190 for initial exploitation; facilitates arbitrary local file reads for T1005 data collection, T1083 file discovery, and T1552.001 credential access from files like wp-config.php.