CVE-2025-6326
Published: 18 December 2025
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Inset inset allows PHP Local File Inclusion.This issue affects Inset: from n/a through <= 1.18.0.
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of the specific PHP Local File Inclusion flaw in the Inset WordPress theme.
Mandates validation of user-supplied filenames at input interfaces to block arbitrary local file inclusion via improper PHP include/require controls.
Enforces secure configuration settings for PHP, such as open_basedir restrictions, to limit the scope of exploitable file inclusions.
Security SummaryAI
CVE-2025-6326 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, referred to as PHP Remote File Inclusion, in the AncoraThemes Inset WordPress theme. It enables PHP Local File Inclusion and affects the Inset theme from unknown initial versions through 1.18.0.
The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Unauthenticated remote attackers meeting the high complexity requirements can exploit it to achieve these impacts, mapped to CWE-98.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/inset/vulnerability/wordpress-inset-1-18-0-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
T1190 directly matches exploitation of a public-facing WordPress theme vulnerability. T1005 is facilitated by LFI enabling unauthorized remote access to local files on the server.