Cyber Posture

CVE-2026-25380

High

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes Feedy feedy allows PHP Local File Inclusion.This issue affects Feedy: from n/a through < 2.1.5.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely remediation of flaws, directly mitigating this CVE by updating the Feedy WordPress theme to version 2.1.5 or later where the vulnerability is patched.

prevent

SI-10 mandates validation of information inputs, preventing attackers from injecting malicious filenames into PHP include/require statements exploited in this local file inclusion vulnerability.

prevent

CM-6 enforces secure configuration settings for PHP, such as disabling allow_url_include or setting open_basedir, to restrict arbitrary file inclusion attempts.

Security SummaryAI

CVE-2026-25380, published on 2026-03-25, is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability (CWE-98), described as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Feedy WordPress theme developed by jwsthemes, impacting all versions from n/a through those prior to 2.1.5.

The vulnerability carries a CVSS v3.1 base score of 8.1 (High), characterized by a network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U), with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Remote attackers without authentication can exploit it over the network, potentially gaining unauthorized access to local files through improper filename controls in PHP include/require statements.

The Patchstack advisory details the local file inclusion vulnerability in the Feedy WordPress theme and indicates it is addressed in version 2.1.5, recommending that users update to this or later versions for mitigation.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a Local File Inclusion (LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing application for unauthorized access or server-side file execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References