Cyber Posture

CVE-2025-60051

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Rare Radio rareradio allows PHP Local File Inclusion.This issue affects Rare Radio: from n/a through <= 1.0.15.1.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-60051 by requiring timely patching of the vulnerable Rare Radio WordPress theme to fix the improper filename control in PHP include/require statements.

prevent

Prevents exploitation of the PHP Local File Inclusion vulnerability by enforcing validation of user-supplied filenames at web entry points before use in include/require operations.

detect

Identifies the file inclusion vulnerability in the Rare Radio theme through regular vulnerability scanning, enabling proactive remediation before remote exploitation.

Security SummaryAI

CVE-2025-60051 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion, affecting the Rare Radio WordPress theme developed by AncoraThemes. This flaw impacts all versions of Rare Radio from n/a through 1.0.15.1 and is associated with CWE-98.

The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it can be exploited remotely by unauthenticated attackers requiring high attack complexity and no user interaction. Successful exploitation grants high impacts on confidentiality, integrity, and availability, potentially allowing attackers to include and execute arbitrary local files on the server.

Mitigation guidance is available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/rareradio/vulnerability/wordpress-rare-radio-theme-1-0-15-1-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a PHP Local File Inclusion (LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing application for remote code execution or file inclusion.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References