CVE-2025-69077
Published: 22 January 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Hobo hobo allows PHP Local File Inclusion.This issue affects Hobo: from n/a through <= 1.0.10.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates PHP local file inclusion by validating user-supplied filenames used in include/require statements to prevent traversal to unauthorized local files.
Requires timely patching or updating of the vulnerable Hobo WordPress theme (versions <=1.0.10) to remediate the improper filename control flaw.
Enforces secure PHP configuration settings like open_basedir restrictions or disabling dangerous functions to limit the scope of local file inclusion exploits.
Security SummaryAI
CVE-2025-69077 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the AncoraThemes Hobo WordPress theme. This issue affects Hobo versions from n/a through 1.0.10. It is associated with CWE-98 and received a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability was published on 2026-01-22.
The vulnerability can be exploited by remote unauthenticated attackers over the network, requiring high attack complexity but no user interaction or privileges. Successful exploitation allows attackers to perform local file inclusion, potentially leading to high confidentiality, integrity, and availability impacts.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/hobo/vulnerability/wordpress-hobo-theme-1-0-10-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-69077 is a local file inclusion vulnerability in a public-facing WordPress theme, directly enabling remote exploitation of a public-facing application (T1190) to include and potentially execute arbitrary local files, leading to unauthorized data access, file modification, or DoS.