CVE-2025-69395
Published: 20 February 2026
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-69395 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion, within the ThemeREX Gable WordPress theme. The flaw enables PHP Local File Inclusion and affects Gable versions from n/a through 1.5 inclusive. It is associated with CWE-98 and received a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility and significant impacts on confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability over the network with high attack complexity and no user interaction required. Successful exploitation allows local file inclusion, potentially enabling attackers to access sensitive files, execute arbitrary code, or disrupt system operations depending on server configuration and file permissions.
Mitigation details are available in advisories such as the Patchstack database entry at https://patchstack.com/database/Wordpress/Theme/gable/vulnerability/wordpress-gable-theme-1-5-local-file-inclusion-vulnerability?_s_id=cve. The vulnerability was published on 2026-02-20T16:22:25.117.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
CVE-2025-69395 is a remote/local file inclusion vulnerability in a public-facing WordPress theme, directly enabling exploitation of a public-facing web application.