Cyber Posture

CVE-2025-69049

High

Published: 22 January 2026

Published
22 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 38.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Töbel tobel allows PHP Local File Inclusion.This issue affects Töbel: from n/a through <= 1.6.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the PHP Local File Inclusion flaw in the Töbel theme by applying patches or custom sanitization fixes as recommended in the Patchstack advisory.

prevent

Validates untrusted inputs to the PHP include/require filename parameter to ensure they conform to expected safe values, preventing arbitrary local file inclusion.

prevent

Restricts filename inputs to block path traversal sequences and other malicious patterns that enable local file inclusion attacks.

Security SummaryAI

CVE-2025-69049 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Elated-Themes Töbel WordPress theme. This flaw affects all versions of Töbel up to and including 1.6. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.

Remote unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially leading to arbitrary local file inclusion, sensitive data disclosure, or remote code execution depending on server configuration.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/tobel/vulnerability/wordpress-toebel-theme-1-6-local-file-inclusion-vulnerability?_s_id=cve provides details on the vulnerability, including recommended mitigations such as updating to a patched version of the Töbel theme if available or applying custom fixes to sanitize file inclusion parameters.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

LFI in public-facing WordPress theme directly enables exploitation of public-facing application (T1190), facilitates collection of data from local system files (T1005), and access to credentials in sensitive local files like wp-config.php (T1081).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References