Cyber Posture

CVE-2025-60052

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes W&D wd allows PHP Local File Inclusion.This issue affects W&D: from n/a through <= 1.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the specific PHP Local File Inclusion flaw in the W&D WordPress theme through timely patching and update installation.

prevent

Requires validation of user-supplied filename inputs to PHP include/require statements, preventing malicious local file inclusion.

prevent

Enforces secure PHP configuration settings like open_basedir to restrict file access paths and mitigate LFI exploitation.

Security SummaryAI

CVE-2025-60052 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the W&D WordPress theme by AncoraThemes. The issue affects the W&D theme from n/a through version 1.0 inclusive. Published on 2025-12-18, it is associated with CWE-98 and carries a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated remote attacker can exploit this vulnerability over the network with high attack complexity and no user interaction required. Successful exploitation can result in high confidentiality, integrity, and availability impacts, allowing local file inclusion that may lead to unauthorized access to local files on the server.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/wd/vulnerability/wordpress-w-d-theme-1-0-local-file-inclusion-vulnerability?_s_id=cve documents this vulnerability in the WordPress theme.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

T1190: Vulnerability in public-facing WordPress theme allows unauthenticated remote exploitation. T1005: LFI enables unauthorized access to and exfiltration of local files on the server.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References