Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Kyle Phillips Favorites favorites allows PHP Local File Inclusion.This issue affects Favorites: from n/a through <= 2.3.6.
Published: 2025-11-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from improper control of the filename in PHP include/require statements, allowing an attacker to influence the file path that the Favorites plugin loads. This flaw falls under the input validation weakness identified as CWE‑98 and can lead to Local File Inclusion. If an attacker supplies a crafted request, they could read sensitive files on the server and, in worst case, execute arbitrary code if the included file contains executable payloads.

Affected Systems

The affected product is the WordPress Favorites plugin developed by Kyle Phillips. Versions from the initial release through 2.3.6 are susceptible to the Local File Inclusion flaw. Users running any of these versions are at risk when the plugin processes untrusted filenames.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity for this LFI flaw. However, the EPSS score of <1% reflects a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need to supply a request that directs the plugin to include an unintended local file. While no specific exploitation proof‑of‑concept is documented, the nature of LFI makes remote code execution a theoretical possibility if the attacker can write files to the server or influence included scripts.

Generated by OpenCVE AI on April 30, 2026 at 05:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Favorites plugin to a release newer than version 2.3.6.
  • Limit the file system permissions for the WordPress uploads directory and the plugin directory to the least privilege necessary; ensure the web server user does not have write access to sensitive directories.
  • Use the WordPress constant DISALLOW_FILE_EDIT to disable the built‑in file editor, preventing attackers from uploading malicious files via the admin interface.

Generated by OpenCVE AI on April 30, 2026 at 05:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Kyle Phillips Favorites favorites allows PHP Local File Inclusion.This issue affects Favorites: from n/a through <= 2.3.6.
Title WordPress Favorites plugin <= 2.3.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:57.735Z

Reserved: 2025-09-25T15:28:42.279Z

Link: CVE-2025-60202

cve-icon Vulnrichment

Updated: 2025-11-06T17:38:29.966Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:05.713

Modified: 2026-04-27T16:16:33.360

Link: CVE-2025-60202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses