CVE-2025-69080
Published: 07 January 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JanStudio Gecko gecko allows PHP Local File Inclusion.This issue affects Gecko: from n/a through <= 1.9.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, prioritization, and timely remediation of flaws like this LFI vulnerability in the Gecko WordPress theme through patching.
Mandates validation of information inputs such as untrusted filenames supplied to PHP include/require statements, addressing the core improper control issue.
Enables vulnerability scanning to identify the presence of this specific LFI flaw in deployed Gecko theme versions up to 1.9.8.
Security SummaryAI
CVE-2025-69080 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the JanStudio Gecko WordPress theme. This issue affects Gecko versions from n/a through 1.9.8. The vulnerability was published on 2026-01-07 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to potential for significant confidentiality, integrity, and availability impacts.
Unauthenticated remote attackers can exploit this vulnerability over the network without user interaction, though it requires high attack complexity. Exploitation allows local file inclusion, potentially enabling attackers to read sensitive server files or, in some configurations, escalate to remote code execution if combined with writable file upload capabilities or other flaws.
For mitigation guidance, security practitioners should review the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/gecko/vulnerability/wordpress-gecko-theme-1-9-8-local-file-inclusion-vulnerability?_s_id=cve, which details the vulnerability in the Gecko theme version 1.9.8 and likely includes patch or update recommendations.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a Local File Inclusion (LFI) in a public-facing WordPress theme, enabling unauthenticated remote exploitation for arbitrary code execution and data disclosure, directly mapping to Exploit Public-Facing Application (T1190).