Cyber Posture

CVE-2025-62045

High

Published: 06 November 2025

Published
06 November 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 31.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-62045 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion (CWE-98), affecting CodexThemes' TheGem Theme Elements (for WPBakery) plugin, known as thegem-elements, for WordPress. This issue impacts all versions from n/a through 5.10.5.1. Published on 2025-11-06, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its potential for significant impact.

Unauthenticated attackers with network access can exploit this vulnerability, though it requires high attack complexity and no user interaction. Successful exploitation enables high confidentiality, integrity, and availability impacts, allowing attackers to include and execute remote files, potentially leading to remote code execution on the targeted WordPress site.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/thegem-elements/vulnerability/wordpress-thegem-theme-elements-for-wpbakery-plugin-5-10-5-1-local-file-inclusion-vulnerability?_s_id=cve documents the vulnerability and provides mitigation guidance for affected installations of the TheGem Theme Elements plugin up to version 5.10.5.1.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

RFI vulnerability in public-facing WordPress plugin enables unauthenticated remote code execution via exploitation of public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References