Cyber Posture

CVE-2025-69038

High

Published: 22 January 2026

Published
22 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 38.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in goalthemes Hyori hyori allows PHP Local File Inclusion.This issue affects Hyori: from n/a through <= 1.3.6.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and remediation of flaws like CVE-2025-69038 in the Hyori theme, directly preventing exploitation through patching.

prevent

SI-10 mandates validation of untrusted inputs to PHP include/require statements, directly addressing improper filename control that enables LFI.

prevent

CM-6 enforces secure PHP configuration settings like open_basedir and disabled file functions to restrict arbitrary local file access.

Security SummaryAI

CVE-2025-69038 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (LFI), affecting the Hyori WordPress theme developed by goalthemes. The vulnerability impacts all versions of Hyori from n/a through 1.3.6 inclusive. It was published on 2026-01-22 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-98.

Remote attackers can exploit this vulnerability over the network without requiring user privileges or user interaction, though exploitation demands high attack complexity. Successful attacks grant high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to include and execute arbitrary local files on the server.

Mitigation details and patches are documented in advisories such as the Patchstack database entry for the WordPress Hyori theme vulnerability at https://patchstack.com/database/Wordpress/Theme/hyori/vulnerability/wordpress-hyori-theme-1-3-6-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Unauthenticated remote attackers can exploit the public-facing WordPress theme vulnerability (T1190) via PHP local file inclusion to access and potentially execute arbitrary local files, facilitating collection of data from the local system (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References