Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Classified Listing classified-listing allows PHP Local File Inclusion.This issue affects Classified Listing: from n/a through <= 4.2.0.
Published: 2025-06-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from improper validation of user input that controls the filename used in PHP include/require statements. An attacker who can manipulate the inclusion path can read arbitrary files on the server and, if the included file contains executable PHP code, may gain the ability to run arbitrary code. Such ability compromises the confidentiality of sensitive data and could also enable changes to server configuration or content integrity.

Affected Systems

The flaw exists in the RadiusTheme Classified Listing WordPress plugin for all releases up to and including version 4.2.0. Any WordPress site that has this plugin installed and not upgraded beyond the affected threshold is potentially exposed.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity local file inclusion flaw. The EPSS score of less than 1 % signals that, while exploitation is possible, it is currently very unlikely to be widely observed. The vulnerability is not listed in the CISA KEV catalog. Likely remediation requires a crafted HTTP request to a plugin endpoint where the filename parameter is unsanitized, making remote exploitation feasible from the web. No special system compromise is required beyond access to the vulnerable web application.

Generated by OpenCVE AI on April 30, 2026 at 11:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Classified Listing to version 4.2.1 or later.
  • If immediate update is not possible, restrict user access to the plugin’s functionality that allows filename manipulation, for example, by disabling it with a configuration flag or by limiting the relevant HTTP endpoints to authenticated users only.
  • Apply server‑side input sanitization to the filename parameter, ensuring only whitelisted, absolute paths can be used, or remove the direct include/require usage entirely.

Generated by OpenCVE AI on April 30, 2026 at 11:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28454 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Classified Listing allows PHP Local File Inclusion. This issue affects Classified Listing: from n/a through 4.2.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Classified Listing allows PHP Local File Inclusion. This issue affects Classified Listing: from n/a through 4.2.0. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Classified Listing classified-listing allows PHP Local File Inclusion.This issue affects Classified Listing: from n/a through <= 4.2.0.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Classified Listing allows PHP Local File Inclusion. This issue affects Classified Listing: from n/a through 4.2.0.
Title WordPress Classified Listing plugin <= 4.2.0 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:17.417Z

Reserved: 2025-06-19T10:02:14.560Z

Link: CVE-2025-52715

cve-icon Vulnrichment

Updated: 2025-06-23T16:14:29.166Z

cve-icon NVD

Status : Deferred

Published: 2025-06-20T15:15:32.647

Modified: 2026-04-23T15:32:04.327

Link: CVE-2025-52715

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T11:15:35Z

Weaknesses