Cyber Posture

CVE-2025-62053

High

Published: 06 November 2025

Published
06 November 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 31.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-62053 is an Improper Control of Filename for Include/Require Statement in PHP Program, classified as a PHP Remote File Inclusion vulnerability (CWE-98), affecting the Houzez WordPress theme developed by favethemes. This issue impacts Houzez versions from n/a through those prior to 4.2.0.

Unauthenticated remote attackers can exploit the vulnerability over the network without requiring user interaction, though exploitation demands high attack complexity (AV:N/AC:H/PR:N/UI:N/S:U). Successful attacks enable high-impact consequences on confidentiality, integrity, and availability (C:H/I:H/A:H), with a CVSS v3.1 base score of 8.1, potentially allowing arbitrary file inclusion and related compromises.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/houzez/vulnerability/wordpress-houzez-theme-4-2-0-local-file-inclusion-vulnerability?_s_id=cve documents the vulnerability and indicates mitigation through updating to Houzez version 4.2.0 or later, where the issue is addressed.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote file inclusion flaw in a public-facing WordPress theme, directly exploited unauthenticated over the network, mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References