Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QuantumCloud ChatBot chatbot allows PHP Local File Inclusion.This issue affects ChatBot: from n/a through <= 6.3.5.
Published: 2025-02-25
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a CWE‑98 Local File Inclusion flaw caused by improper control of the filename used in PHP include/require statements. An attacker who can influence the file path supplied to the ChatBot plugin can cause the server to read arbitrary local files, exposing configuration data or credentials. Although the flaw does not directly allow execution of code, the ability to read sensitive files may help an attacker plan a subsequent attack.

Affected Systems

The flaw affects QuantumCloud’s ChatBot plugin for WordPress. All releases of the plugin with version numbers up through 6.3.5 are vulnerable, as the issue was present from the earliest version (“n/a”) through 6.3.5. No later releases are known to be impacted.

Risk and Exploitability

With a CVSS score of 7.5 and an EPSS score of less than 1%, the likelihood that this flaw will be actively exploited is low. The plugin likely requires an unauthenticated or low‑privilege request that triggers an include/require with a user‑supplied path; based on the description, it is inferred that the attack vector involves manipulating a file path parameter in a request to the plugin’s endpoint. Because the flaw does not enable remote code execution, the primary risk is leaking sensitive local files, but the overall impact remains moderate, and the vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on May 2, 2026 at 04:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch for the QuantumCloud ChatBot plugin
  • If a patch cannot be applied immediately, disable or uninstall the plugin
  • Validate and limit any user‑supplied file paths used in include/require operations to prevent arbitrary file access

Generated by OpenCVE AI on May 2, 2026 at 04:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5434 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QuantumCloud ChatBot allows PHP Local File Inclusion. This issue affects ChatBot: from n/a through 6.3.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QuantumCloud ChatBot allows PHP Local File Inclusion. This issue affects ChatBot: from n/a through 6.3.5. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QuantumCloud ChatBot chatbot allows PHP Local File Inclusion.This issue affects ChatBot: from n/a through <= 6.3.5.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 25 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 14:30:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QuantumCloud ChatBot allows PHP Local File Inclusion. This issue affects ChatBot: from n/a through 6.3.5.
Title WordPress WPBot plugin <= 6.3.5 - Local File Inclusion vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Quantumcloud Chatbot Wpbot
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:44.396Z

Reserved: 2025-02-17T11:51:10.110Z

Link: CVE-2025-26932

cve-icon Vulnrichment

Updated: 2025-02-25T15:12:50.492Z

cve-icon NVD

Status : Deferred

Published: 2025-02-25T15:15:27.337

Modified: 2026-04-23T15:26:05.803

Link: CVE-2025-26932

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T04:15:06Z

Weaknesses