Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebGeniusLab Zikzag Core zikzag-core allows PHP Local File Inclusion.This issue affects Zikzag Core: from n/a through <= 1.4.5.
Published: 2025-06-27
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A PHP Local File Inclusion flaw exists in the Zikzag Core WordPress plugin versions up to and including 1.4.5. The vulnerability arises because the plugin uses an uncontrolled filename in an include or require statement, allowing an attacker to read arbitrary files on the server or, if the attacker can place a PHP file in a readable location, execute code. This can compromise confidentiality and, if misused, lead to full system compromise through remote code execution. The weakness is characterized by CWE‑98.

Affected Systems

WordPress sites running the WebGeniusLab Zikzag Core plugin with a version that is 1.4.5 or older are affected. The flaw is present in all releases from the beginning of the plugin up to the specified version.

Risk and Exploitability

The CVSS score of 8.1 classifies this as a high‑severity vulnerability. The EPSS score of <1% indicates a low probability of exploitation at the current time, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is exploitation via crafted requests to the plugin, leveraging user input that is incorporated into a file inclusion path. Successful exploitation could expose sensitive files or allow the execution of attacker‑controlled PHP code, depending on file permissions and server configuration.

Generated by OpenCVE AI on April 30, 2026 at 10:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Zikzag Core to a version newer than 1.4.5, which removes the insecure include logic.
  • If an update is not immediately possible, disable or remove the plugin from the WordPress installation to prevent access to the vulnerable code path.
  • Ensure that the web server limits file inclusion by configuring open_basedir and disabling allow_url_include, and review file permissions to restrict the web server’s read/write access only to necessary directories.

Generated by OpenCVE AI on April 30, 2026 at 10:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19289 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebGeniusLab Zikzag Core allows PHP Local File Inclusion. This issue affects Zikzag Core: from n/a through 1.4.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebGeniusLab Zikzag Core allows PHP Local File Inclusion. This issue affects Zikzag Core: from n/a through 1.4.5. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebGeniusLab Zikzag Core zikzag-core allows PHP Local File Inclusion.This issue affects Zikzag Core: from n/a through <= 1.4.5.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Jun 2025 12:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebGeniusLab Zikzag Core allows PHP Local File Inclusion. This issue affects Zikzag Core: from n/a through 1.4.5.
Title WordPress Zikzag Core plugin <= 1.4.5 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:07.087Z

Reserved: 2025-06-11T16:06:23.852Z

Link: CVE-2025-49886

cve-icon Vulnrichment

Updated: 2025-06-27T14:05:12.984Z

cve-icon NVD

Status : Deferred

Published: 2025-06-27T12:15:38.663

Modified: 2026-04-23T15:31:47.083

Link: CVE-2025-49886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T10:30:34Z

Weaknesses