Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Businext businext allows PHP Local File Inclusion.This issue affects Businext: from n/a through < 2.4.4.
Published: 2025-10-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is caused by improper control of filenames used in PHP include/require statements within the ThemeMove Businext WordPress theme. An attacker who can influence the filename can trigger a local file inclusion, enabling them to read sensitive files, exfiltrate data, or execute arbitrary code on the server. The weakness is categorized as CWE‑98, which directly maps to a Local File Inclusion flaw.\n

Affected Systems

The affected products are ThemeMove’s Businext WordPress theme. All releases from the initial available version up to any version earlier than 2.4.4 are impacted. No specific minor versions are enumerated beyond the upper boundary of 2.4.4.\n

Risk and Exploitability

The CVSS score of 8.1 denotes high severity, indicating substantial impact on confidentiality, integrity, and availability if successfully exploited. The EPSS score being less than 1% suggests a low current likelihood of exploitation, though the flaw remains present on unpatched installations. It is not listed in the CISA KEV catalog. The probable attack vector is local to the web server, requiring that the attacker can send crafted requests that influence the include path, which is typically possible through exposed URLs or form inputs. The flaw does not require specialized conditions beyond standard web application usage, making it accessible to attackers with web access.

Generated by OpenCVE AI on April 29, 2026 at 23:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Businext theme to version 2.4.4 or later to apply the vendor‑provided fix.
  • If an immediate upgrade is not possible, restrict the use of the include/require functions in the theme by ensuring that only absolute, whitelisted paths are used and by sanitizing any user‑supplied file names.\n
  • Audit the theme’s code for other uncontrolled include use and adjust file permissions on the server so that PHP cannot read privileged files.

Generated by OpenCVE AI on April 29, 2026 at 23:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 29 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Thememove
Thememove businext
CPEs cpe:2.3:a:thememove:businext:*:*:*:*:*:wordpress:*:*
Vendors & Products Thememove
Thememove businext

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Businext businext allows PHP Local File Inclusion.This issue affects Businext: from n/a through < 2.4.4.
Title WordPress Businext theme < 2.4.4 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Thememove Businext
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:50.512Z

Reserved: 2025-09-06T04:45:10.579Z

Link: CVE-2025-58967

cve-icon Vulnrichment

Updated: 2025-10-23T13:39:46.245Z

cve-icon NVD

Status : Modified

Published: 2025-10-22T15:15:53.090

Modified: 2026-04-27T20:16:23.083

Link: CVE-2025-58967

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:45:16Z

Weaknesses