Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Arraytics WPCafe wp-cafe allows PHP Local File Inclusion.This issue affects WPCafe: from n/a through <= 2.2.31.
Published: 2025-03-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Arraytics WPCafe plugin contains a flaw where the filename parameter for a PHP include/require statement is not properly controlled. This leads to a Local File Inclusion vulnerability that can allow an attacker to read arbitrary files on the web server, such as configuration files, credentials, or system files. If an attacker can inject a PHP file as the included path, the vulnerability may also be leveraged for code execution. The weakness is identified as CWE‑98, representing Improper Control of Filename for Include/Require.

Affected Systems

WordPress sites running the Arraytics WPCafe plugin version 2.2.31 or earlier are affected. The vulnerability applies to all deployments of the plugin up to and including version 2.2.31, regardless of other WordPress configuration.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, while the EPSS score of less than 1% shows a low probability of exploitation at the time of analysis and the issue is not currently listed in the CISA KEV catalog. Exploitation requires the attacker to supply a crafted filename argument, likely through a URL parameter or form submission, and requires that the target environment permits inclusion of local files. Given the high confidentiality and integrity impact and the ability to potentially execute remote code via local files, the overall risk to impacted sites remains high, especially for those exposed to the public Internet.

Generated by OpenCVE AI on May 1, 2026 at 03:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WPCafe to the latest available version, which removes the vulnerable include logic
  • If the plugin is not required, disable or uninstall it to eliminate the attack surface
  • Apply the vendor's security recommendations by validating and sanitizing any filename inputs and restricting file includes to a whitelisted directory or file list

Generated by OpenCVE AI on May 1, 2026 at 03:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8348 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter WPCafe allows PHP Local File Inclusion. This issue affects WPCafe: from n/a through 2.2.31.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter WPCafe allows PHP Local File Inclusion. This issue affects WPCafe: from n/a through 2.2.31. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Arraytics WPCafe wp-cafe allows PHP Local File Inclusion.This issue affects WPCafe: from n/a through <= 2.2.31.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 27 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 11:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter WPCafe allows PHP Local File Inclusion. This issue affects WPCafe: from n/a through 2.2.31.
Title WordPress WPCafe plugin <= 2.2.31 - Local File Inclusion vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Themewinter Wpcafe
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:58.403Z

Reserved: 2025-03-26T09:20:39.457Z

Link: CVE-2025-30829

cve-icon Vulnrichment

Updated: 2025-03-27T13:59:00.200Z

cve-icon NVD

Status : Deferred

Published: 2025-03-27T11:15:44.257

Modified: 2026-04-23T15:27:09.110

Link: CVE-2025-30829

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T04:00:06Z

Weaknesses