Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hinnerk Altenburg Immocaster WordPress Plugin immocaster allows PHP Local File Inclusion.This issue affects Immocaster WordPress Plugin: from n/a through <= 1.3.6.
Published: 2025-11-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper control of filename for an include/require statement in the PHP code of the Immocaster WordPress Plugin, which allows an attacker to trigger a local file inclusion. The impact is that a malicious actor can read arbitrary files from the server’s file system, potentially leading to disclosure of sensitive data, credential compromise, or further exploitation. This weakness falls under CWE-98, indicating insecure handling of file operations in PHP.

Affected Systems

The affected product is the Immocaster WordPress Plugin developed by Hinnerk Altenburg, versions up to and including 1.3.6. Users running any of these releases on a WordPress installation are susceptible to the vulnerability.

Risk and Exploitability

The CVSS score of 8.1 signifies high severity, and the EPSS score of less than 1% indicates a low but non-zero likelihood of exploitation in the wild at the time of analysis. The vulnerability is not listed in CISA KEV, suggesting that no known large-scale exploitation has been reported. The likely attack vector is remote, requiring the attacker to send a crafted HTTP request that manipulates the file path used in the include/require statement.

Generated by OpenCVE AI on April 30, 2026 at 05:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Immocaster to a version newer than 1.3.6 once the vendor releases a patch.
  • If an update is not possible, remove or deactivate the Immocaster plugin to eliminate the vulnerable code path.
  • Configure the WordPress installation’s file system permissions and PHP include path to restrict access only to trusted directories, preventing unintended file inclusions.

Generated by OpenCVE AI on April 30, 2026 at 05:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 06 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Hinnerk Altenburg
Hinnerk Altenburg immocaster Wordpress Plugin
Wordpress
Wordpress wordpress
Vendors & Products Hinnerk Altenburg
Hinnerk Altenburg immocaster Wordpress Plugin
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hinnerk Altenburg Immocaster WordPress Plugin immocaster allows PHP Local File Inclusion.This issue affects Immocaster WordPress Plugin: from n/a through <= 1.3.6.
Title WordPress Immocaster WordPress Plugin plugin <= 1.3.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Hinnerk Altenburg Immocaster Wordpress Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:57.089Z

Reserved: 2025-09-25T15:28:34.981Z

Link: CVE-2025-60190

cve-icon Vulnrichment

Updated: 2025-11-06T21:19:47.186Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:03.903

Modified: 2026-04-27T17:16:28.450

Link: CVE-2025-60190

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses