Cyber Posture

CVE-2025-67522

High

Published: 09 December 2025

Published
09 December 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-67522 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the NooTheme Jobmonster WordPress theme. This issue affects Jobmonster versions from n/a through 4.8.2.

The vulnerability carries a CVSS v3.1 base score of 7.5 (High), with an attack vector of network (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). It can be exploited by a low-privileged network attacker, such as an authenticated user with basic WordPress roles, to perform local file inclusion, potentially allowing arbitrary file reads or execution of local PHP files depending on server configuration.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/noo-jobmonster/vulnerability/wordpress-jobmonster-theme-4-8-2-local-file-inclusion-vulnerability?_s_id=cve, which documents the vulnerability in the Jobmonster theme version 4.8.2.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2025-67522 is a Local File Inclusion vulnerability in a public-facing WordPress theme exploitable remotely by unauthenticated attackers, directly enabling T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References