CVE-2025-69043
Published: 22 January 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in goalthemes Rashy rashy allows PHP Local File Inclusion.This issue affects Rashy: from n/a through <= 1.1.3.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely patching or removal of the vulnerable Rashy WordPress theme (<=1.1.3) to remediate the LFI flaw.
Mandates validation of user-controlled inputs to PHP include/require statements, preventing malicious filename injection leading to LFI.
Facilitates identification of the LFI vulnerability in Rashy theme through vulnerability scanning of WordPress components.
Security SummaryAI
CVE-2025-69043 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the Rashy WordPress theme by goalthemes. The issue impacts Rashy versions from n/a through 1.1.3 and is associated with CWE-98. It was published on 2026-01-22 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated attackers can exploit this vulnerability remotely over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling local file inclusion to disclose sensitive data or execute arbitrary code depending on server configuration.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/rashy/vulnerability/wordpress-rashy-theme-1-1-3-local-file-inclusion-vulnerability?_s_id=cve documents the Local File Inclusion vulnerability specifically in Rashy theme version 1.1.3 and provides details on affected WordPress installations.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote Local File Inclusion (LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing application.