Cyber Posture

CVE-2025-69043

High

Published: 22 January 2026

Published
22 January 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 38.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in goalthemes Rashy rashy allows PHP Local File Inclusion.This issue affects Rashy: from n/a through <= 1.1.3.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching or removal of the vulnerable Rashy WordPress theme (<=1.1.3) to remediate the LFI flaw.

prevent

Mandates validation of user-controlled inputs to PHP include/require statements, preventing malicious filename injection leading to LFI.

detect

Facilitates identification of the LFI vulnerability in Rashy theme through vulnerability scanning of WordPress components.

Security SummaryAI

CVE-2025-69043 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the Rashy WordPress theme by goalthemes. The issue impacts Rashy versions from n/a through 1.1.3 and is associated with CWE-98. It was published on 2026-01-22 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this vulnerability remotely over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling local file inclusion to disclose sensitive data or execute arbitrary code depending on server configuration.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/rashy/vulnerability/wordpress-rashy-theme-1-1-3-local-file-inclusion-vulnerability?_s_id=cve documents the Local File Inclusion vulnerability specifically in Rashy theme version 1.1.3 and provides details on affected WordPress installations.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated remote Local File Inclusion (LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References