Cyber Posture

CVE-2025-59564

High

Published: 22 October 2025

Published
22 October 2025
Modified
29 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-59564 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and described as enabling PHP Local File Inclusion, in the ThemeMove EduMall WordPress theme. The issue affects EduMall versions from n/a through those prior to 4.4.5.

Unauthenticated remote attackers (AV:N/PR:N/UI:N) can exploit this vulnerability over the network with high attack complexity (AC:H) and unchanged scope (S:U), potentially achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in a CVSS v3.1 base score of 8.1.

The Patchstack advisory details this Local File Inclusion vulnerability in the WordPress EduMall theme and indicates it is addressed in version 4.4.5.

Details

CWE(s)
CWE-98

Affected Products

thememove
edumall
≤ 4.4.5

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Unauthenticated remote LFI in public-facing WordPress theme enables T1190 (Exploit Public-Facing Application) and facilitates T1005 (Data from Local System) via arbitrary local file reads.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References