CVE-2025-60067
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Giardino giardino allows PHP Local File Inclusion.This issue affects Giardino: from n/a through <= 1.1.10.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper control of filenames in PHP include/require statements by requiring validation of user-supplied inputs to prevent local file inclusion exploitation.
Requires timely remediation of the specific flaw in Giardino WordPress theme versions through <=1.1.10 via patching or removal to eliminate the vulnerability.
Implements boundary protection such as web application firewalls to monitor and block network requests manipulating filename parameters for file inclusion attacks.
Security SummaryAI
CVE-2025-60067 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the Giardino WordPress theme developed by axiomthemes. The issue affects all versions of the Giardino theme from n/a through 1.1.10. It carries a CVSS v3.1 base score of 8.1 (High), reflecting network accessibility (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability was published on 2025-12-18.
Remote, unauthenticated attackers can exploit this vulnerability over the network by manipulating filename controls in PHP include/require statements within the affected theme. Exploitation requires high complexity but no privileges or user interaction, potentially allowing attackers to include and execute arbitrary local PHP files, leading to unauthorized access, data disclosure, modification, or denial of service consistent with the high CVSS impacts.
Patchstack's advisory at https://patchstack.com/database/Wordpress/Theme/giardino/vulnerability/wordpress-giardino-theme-1-1-10-local-file-inclusion-vulnerability?_s_id=cve provides details on the Local File Inclusion vulnerability specific to Giardino theme version 1.1.10.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables remote unauthenticated exploitation of a web application, directly mapping to T1190: Exploit Public-Facing Application.