CVE-2025-60198
Published: 06 November 2025
Description
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Security Summary
CVE-2025-60198 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the dedalx Saxon Viral Content Blog & Magazine Marketing WordPress Theme (saxon). This issue affects all versions from an unspecified initial release through 1.9.3. Published on 2025-11-06, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.
Unauthenticated attackers with network access can exploit this vulnerability, though it requires high attack complexity and no user interaction. Exploitation via local file inclusion grants high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to read sensitive local files, execute arbitrary code, or disrupt the affected WordPress site.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/saxon/vulnerability/wordpress-saxon-viral-content-blog-magazine-marketing-wordpress-theme-theme-1-9-3-local-file-inclusion-vulnerability?_s_id=cve provides details on mitigation, including recommended patches or updates for the Saxon theme.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Public-facing WordPress theme LFI vulnerability exploited remotely without authentication (T1190), enabling arbitrary local file reads for sensitive data (T1005) including potential credentials in files like wp-config.php (T1552.001).