Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality formality allows PHP Local File Inclusion.This issue affects Formality: from n/a through <= 1.5.9.
Published: 2025-08-20
Score: 8.1 High
EPSS: 5.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in Michele Giorgi Formality arises from improper handling of filenames in a PHP include/require statement, enabling Local File Inclusion. An attacker who can influence the include path can read arbitrary files on the server, potentially executing sensitive code or retrieving confidential data. The weakness is classified as CWE-98, representing a lack of validation on include paths.

Affected Systems

The issue affects the Formality WordPress plugin by Michele Giorgi, specifically all releases up to and including version 1.5.9. Users running any of those versions are vulnerable.

Risk and Exploitability

With a CVSS score of 8.1, the vulnerability is considered high severity. The EPSS score of 5% indicates a low probability of widespread exploitation at this time. Since the vulnerability involves local file inclusion, an attacker would typically need some form of input that reaches the plugin code, such as a crafted query string or form field. The vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread exploitation. Nevertheless, the potential to read arbitrary files or execute code makes this a significant risk for any WordPress site using the affected plugin.

Generated by OpenCVE AI on May 12, 2026 at 14:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Formality to any version newer than 1.5.9 where the LFI issue has been fixed.
  • Remove or sanitize any dynamic include calls within the plugin, ensuring the filename is not derived directly from user input (CWE-98 remediation).
  • Configure PHP so that the plugin’s directory is not exposed to the web and set “open_basedir” to restrict file inclusion to safe locations.

Generated by OpenCVE AI on May 12, 2026 at 14:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25375 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.9. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality formality allows PHP Local File Inclusion.This issue affects Formality: from n/a through <= 1.5.9.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Sun, 24 Aug 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Giorgi
Giorgi formality
Wordpress
Wordpress wordpress
Vendors & Products Giorgi
Giorgi formality
Wordpress
Wordpress wordpress

Wed, 20 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.9.
Title WordPress Formality <= 1.5.9 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Giorgi Formality
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:52.851Z

Reserved: 2025-05-15T18:02:03.511Z

Link: CVE-2025-48157

cve-icon Vulnrichment

Updated: 2025-08-20T17:41:44.489Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T08:15:31.367

Modified: 2026-04-23T15:30:54.137

Link: CVE-2025-48157

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T15:00:16Z

Weaknesses