Cyber Posture

CVE-2025-67957

High

Published: 22 January 2026

Published
22 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 38.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in TangibleWP Listivo Core listivo-core allows PHP Local File Inclusion.This issue affects Listivo Core: from n/a through <= 2.3.77.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the PHP Local File Inclusion flaw in Listivo Core by identifying, testing, and deploying patches or updates for the vulnerable plugin versions.

prevent

Validates filenames supplied to PHP include/require statements in the plugin to block path traversal and unauthorized local file access.

preventdetect

Deploys web application firewalls at boundaries to inspect and block network traffic exploiting the LFI vulnerability with malicious filenames.

Security SummaryAI

CVE-2025-67957 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, affecting the TangibleWP Listivo Core (listivo-core) WordPress plugin. The flaw enables PHP Local File Inclusion (CWE-98) in versions from n/a through 2.3.77. It carries a CVSS v3.1 base score of 8.1 (High) with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H.

Unauthenticated attackers can exploit this vulnerability remotely over the network, requiring high attack complexity but no user interaction or privileges. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, such as unauthorized access to local files or potential code execution via local file inclusion in the PHP context.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/listivo-core/vulnerability/wordpress-listivo-core-plugin-2-3-77-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Local File Inclusion vulnerability in a public-facing WordPress plugin exploitable remotely by unauthenticated attackers over the network, directly mapping to Exploit Public-Facing Application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References