Cyber Posture

CVE-2025-60064

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Renewal renewal allows PHP Local File Inclusion.This issue affects Renewal: from n/a through <= 1.2.2.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the PHP LFI vulnerability in the Renewal WordPress theme by requiring timely patching or updating to a non-vulnerable version.

prevent

Requires validation of filenames supplied to PHP include/require statements, preventing attackers from directing inclusion of arbitrary local files.

prevent

Enforces secure PHP and web server configuration settings, such as open_basedir restrictions, to limit the scope of exploitable file paths in LFI attacks.

Security SummaryAI

CVE-2025-60064 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Renewal WordPress theme developed by axiomthemes, impacting all versions up to and including 1.2.2.

The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with a vector of AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. Remote, unauthenticated attackers can exploit it over the network without user interaction, though it requires high attack complexity. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing attackers to include and potentially execute arbitrary local PHP files, leading to code execution or data exposure.

Patchstack has published details on this local file inclusion vulnerability in the Renewal theme version 1.2.2, available at https://patchstack.com/database/Wordpress/Theme/renewal/vulnerability/wordpress-renewal-theme-1-2-2-local-file-inclusion-vulnerability?_s_id=cve. Practitioners should consult this advisory for recommended mitigations, such as updating to a patched version if available.

Details

CWE(s)

Affected Products

axiomthemes
renewal
≤ 1.2.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote file inclusion flaw in a public-facing WordPress theme, enabling unauthenticated attackers to achieve code execution, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References