Cyber Posture

CVE-2025-60067

High

Published: 18 December 2025

Published
18 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Giardino giardino allows PHP Local File Inclusion.This issue affects Giardino: from n/a through <= 1.1.10.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper control of filenames in PHP include/require statements by requiring validation of user-supplied inputs to prevent local file inclusion exploitation.

prevent

Requires timely remediation of the specific flaw in Giardino WordPress theme versions through <=1.1.10 via patching or removal to eliminate the vulnerability.

preventdetect

Implements boundary protection such as web application firewalls to monitor and block network requests manipulating filename parameters for file inclusion attacks.

Security SummaryAI

CVE-2025-60067 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the Giardino WordPress theme developed by axiomthemes. The issue affects all versions of the Giardino theme from n/a through 1.1.10. It carries a CVSS v3.1 base score of 8.1 (High), reflecting network accessibility (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability was published on 2025-12-18.

Remote, unauthenticated attackers can exploit this vulnerability over the network by manipulating filename controls in PHP include/require statements within the affected theme. Exploitation requires high complexity but no privileges or user interaction, potentially allowing attackers to include and execute arbitrary local PHP files, leading to unauthorized access, data disclosure, modification, or denial of service consistent with the high CVSS impacts.

Patchstack's advisory at https://patchstack.com/database/Wordpress/Theme/giardino/vulnerability/wordpress-giardino-theme-1-1-10-local-file-inclusion-vulnerability?_s_id=cve provides details on the Local File Inclusion vulnerability specific to Giardino theme version 1.1.10.

Details

CWE(s)

Affected Products

axiomthemes
giardino
≤ 1.1.10

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

LFI vulnerability in public-facing WordPress theme enables remote unauthenticated exploitation of a web application, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References