Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Anubis anubis allows PHP Local File Inclusion.This issue affects Anubis: from n/a through <= 1.25.
Published: 2025-12-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper control of the filename used in an include/require statement in the Anubis WordPress theme. This flaw allows an attacker to force the PHP engine to read or include arbitrary local files, which can lead to disclosure of sensitive files or enable further compromise. The weakness is classified as CWE‑98. Based on the description, it is inferred that the attacker may manipulate theme‑provided parameters or craft URLs to trigger the insecure include logic.

Affected Systems

The issue affects the Anubis theme from Axiom Themes installed on WordPress sites, with vulnerable releases up to and including version 1.25. No other versions or products are identified as impacted in the current data.

Risk and Exploitability

The CVSS score of 8.1 reflects a high severity, and the EPSS score of less than 1% indicates a very low but non‑zero probability of exploitation in the wild at this time. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread known exploitation. Based on the description, it is inferred that likely attack vectors involve manipulating theme‑provided parameters or crafted URLs that trigger the insecure include/require. Successful exploitation requires the attacker to have some level of access to the server’s filesystem or to control the input used by the theme’s inclusion logic, allowing the attacker to read sensitive files such as configuration files.

Generated by OpenCVE AI on April 30, 2026 at 14:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Anubis theme to the latest version above 1.25, if available.
  • If an update is not immediately possible, restrict the PHP include path in the server’s configuration to only the theme’s safe directories and deny direct access to other files.
  • Decommission or replace the vulnerable theme until a proper fix is applied.

Generated by OpenCVE AI on April 30, 2026 at 14:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 23 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes anubis
CPEs cpe:2.3:a:axiomthemes:anubis:*:*:*:*:*:wordpress:*:*
Vendors & Products Axiomthemes
Axiomthemes anubis

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Anubis anubis allows PHP Local File Inclusion.This issue affects Anubis: from n/a through <= 1.25.
Title WordPress Anubis theme <= 1.25 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Anubis
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:49.943Z

Reserved: 2025-09-06T04:44:48.014Z

Link: CVE-2025-58933

cve-icon Vulnrichment

Updated: 2025-12-18T18:20:31.893Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:16:00.807

Modified: 2026-04-27T20:16:20.110

Link: CVE-2025-58933

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:45:24Z

Weaknesses