Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in aguilatechnologies WP Customer Area customer-area allows PHP Local File Inclusion.This issue affects WP Customer Area: from n/a through <= 8.3.5.
Published: 2025-11-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WordPress WP Customer Area plugin implements an include/require statement that improperly controls the filename, enabling a PHP Local File Inclusion flaw. An attacker who can influence the include argument can read sensitive local files or trigger execution of PHP code, potentially compromising confidentiality, integrity, or availability of the site. The vulnerability is contained within the plugin’s file inclusion logic and therefore does not automatically grant privilege escalation, but the ability to execute code on the host can have severe consequences if attacker-controlled code is injected.

Affected Systems

The vulnerability affects the WordPress plugin WP Customer Area developed by Aguila Technologies. All installations that use any plugin version from the earliest release up through 8.3.5 are susceptible. There are no known changes to the affected range beyond these versions.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity risk, while the EPSS score of less than 1% suggests the probability of exploitation is currently low. Because the flaw resides in a publicly accessible WordPress plugin, an attacker can potentially exploit it without prior authentication, relying on crafted HTTP requests that manipulate the include path. The scenario is not listed in the CISA Known Exploited Vulnerabilities catalog, so no confirmed field‑deployed exploits are reported at this time. Nonetheless, the high CVSS and the nature of the flaw make the vulnerability a priority for remediation.

Generated by OpenCVE AI on April 29, 2026 at 23:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Customer Area plugin to version 8.3.6 or later to eliminate the unsafe include handling.
  • If an immediate update cannot be applied, temporarily disable the plugin to block any include operations that could be exploited and preserve site functionality until the fix is installed.
  • Continuously monitor WordPress logs for abnormal file include attempts and evidence of unauthorized code execution.

Generated by OpenCVE AI on April 29, 2026 at 23:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in aguilatechnologies WP Customer Area customer-area allows PHP Local File Inclusion.This issue affects WP Customer Area: from n/a through <= 8.3.4. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in aguilatechnologies WP Customer Area customer-area allows PHP Local File Inclusion.This issue affects WP Customer Area: from n/a through <= 8.3.5.
Title WordPress WP Customer Area plugin <= 8.3.4 - Local File Inclusion vulnerability WordPress WP Customer Area plugin <= 8.3.5 - Local File Inclusion vulnerability
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in aguilatechnologies WP Customer Area customer-area allows PHP Local File Inclusion.This issue affects WP Customer Area: from n/a through <= 8.2.7. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in aguilatechnologies WP Customer Area customer-area allows PHP Local File Inclusion.This issue affects WP Customer Area: from n/a through <= 8.3.4.
Title WordPress WP Customer Area plugin <= 8.2.7 - Local File Inclusion vulnerability WordPress WP Customer Area plugin <= 8.3.4 - Local File Inclusion vulnerability

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in aguilatechnologies WP Customer Area customer-area allows PHP Local File Inclusion.This issue affects WP Customer Area: from n/a through <= 8.2.7.
Title WordPress WP Customer Area plugin <= 8.2.7 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:57.667Z

Reserved: 2025-09-25T15:28:42.279Z

Link: CVE-2025-60201

cve-icon Vulnrichment

Updated: 2025-11-06T17:40:39.200Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:05.570

Modified: 2026-04-27T16:16:33.230

Link: CVE-2025-60201

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:15:23Z

Weaknesses