Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce premmerce allows PHP Local File Inclusion.This issue affects Premmerce: from n/a through <= 1.3.19.
Published: 2025-11-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Premmerce Premmerce plugin allows PHP Local File Inclusion by improperly controlling the filename used in an include/require statement. This flaw enables an attacker to read arbitrary files from the server or, if the local file includes executable code, to execute that code within the context of the web application. The potential confidentiality impact is significant, while the integrity impact could extend to code injection if the attacker supplies malicious local files.

Affected Systems

All installations of the Premmerce WordPress plugin with a version number of 1.3.19 or earlier are affected. No specific WordPress core version is required; the vulnerability resides entirely within the plugin code.

Risk and Exploitability

The CVSS score of 7.5 indicates a high risk level, but the EPSS score of less than 1% suggests that this vulnerability is currently exploited with low frequency. It is not listed in CISA KEV. The likely attack vector is via user-controlled parameters that influence the filename in the include statement; in the absence of explicit information, it is inferred that the vulnerability could be triggered through a crafted URL or input form that passes an arbitrary or local path.

Generated by OpenCVE AI on April 29, 2026 at 13:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Premmerce plugin to the latest version that removes the vulnerable include logic.
  • If upgrading is not possible immediately, modify the plugin to validate any filename against a strict whitelist and remove direct user input from the include statement.
  • Restrict file permissions on the WordPress installation to limit the attacker's ability to read sensitive server files.

Generated by OpenCVE AI on April 29, 2026 at 13:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Premmerce
Premmerce premmerce
Wordpress
Wordpress wordpress
Vendors & Products Premmerce
Premmerce premmerce
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce premmerce allows PHP Local File Inclusion.This issue affects Premmerce: from n/a through <= 1.3.19.
Title WordPress Premmerce plugin <= 1.3.19 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Premmerce Premmerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:43:56.710Z

Reserved: 2025-09-25T15:34:44.964Z

Link: CVE-2025-60241

cve-icon Vulnrichment

Updated: 2025-11-07T14:18:18.790Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:06.767

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-60241

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T14:00:12Z

Weaknesses