Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme BRW ova-brw allows PHP Local File Inclusion.This issue affects BRW: from n/a through <= 1.8.7.
Published: 2025-06-27
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An improper control of the filename used in a PHP include/require statement introduces a PHP Local File Inclusion flaw in the ovatheme BRW WordPress plugin. This vulnerability allows an attacker to read arbitrary local files on the server and may enable execution of malicious code, jeopardizing both confidentiality and integrity of the site. The vendor description indicates that the flaw exists across versions up to 1.8.7, but it does not specify a precise attack surface. Based on the nature of the flaw, it is inferred that the likely attack vector involves a publicly reachable input that supplies a file name to the plugin’s include logic.

Affected Systems

WordPress sites that have the ovatheme BRW plugin (ova-brw) installed and running a version numbered 1.8.7 or earlier are vulnerable. The plugin is distributed under the ova-brw package in WordPress repositories. The vulnerability is not limited to a specific WordPress theme or other plugins; it affects any site that includes this plugin irrespective of other components.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score below 1% suggests a low probability of exploitation in the short term. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only access to a publicly available endpoint of the plugin that accepts a file path and passes it to an include/require statement; no privileged credentials are explicitly required. Given that LFI can lead to full code execution if the attacker controls the included file, the potential impact remains significant if the vulnerability is triggered.

Generated by OpenCVE AI on April 30, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to ovatheme BRW plugin version 1.8.8 or later, which resolves the LFI flaw.
  • If upgrading is not feasible, immediately deactivate or uninstall the plugin to remove the vulnerability.
  • Implement input validation: limit file inclusion parameters to a whitelist of allowed filenames or paths, ensuring the include/require statement cannot process arbitrary paths.

Generated by OpenCVE AI on April 30, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19308 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme BRW allows PHP Local File Inclusion. This issue affects BRW: from n/a through 1.7.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme BRW allows PHP Local File Inclusion. This issue affects BRW: from n/a through 1.7.9. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme BRW ova-brw allows PHP Local File Inclusion.This issue affects BRW: from n/a through <= 1.8.7.
Title WordPress BRW plugin <= 1.7.9 - Local File Inclusion Vulnerability WordPress BRW plugin <= 1.8.8 - Local File Inclusion Vulnerability
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Jun 2025 12:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme BRW allows PHP Local File Inclusion. This issue affects BRW: from n/a through 1.7.9.
Title WordPress BRW plugin <= 1.7.9 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:19.558Z

Reserved: 2025-06-19T10:03:36.790Z

Link: CVE-2025-52814

cve-icon Vulnrichment

Updated: 2025-06-27T13:10:48.644Z

cve-icon NVD

Status : Deferred

Published: 2025-06-27T12:15:43.213

Modified: 2026-04-23T15:32:13.460

Link: CVE-2025-52814

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T17:30:26Z

Weaknesses