Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme ITok itok.This issue affects ITok: from n/a through <= 1.1.42.
Published: 2025-11-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The ITok WordPress theme contains an improper control of filename for the include/require PHP statement, allowing an attacker to direct the theme to include or read arbitrary files from the local filesystem. This Local File Inclusion flaw (CWE‑98) can expose sensitive site files such as configuration data or credentials, potentially giving the attacker broad visibility into the server and the ability to trigger further attacks if writable files exist or if the theme later processes remote content. The CVE description labels the issue as a PHP Remote File Inclusion vulnerability, but the actual effect is limited to local file inclusion, though chaining with other weaknesses could elevate the risk.

Affected Systems

ApusTheme ITok for WordPress is affected. The vulnerability exists in all releases from the earliest known version through ITok version 1.1.42. Any WordPress site that installs or continues to use an ITok theme version 1.1.42 or older is vulnerable. The flaw does not impact other WordPress themes or plugins.

Risk and Exploitability

The flaw carries a CVSS score of 8.1, indicating a high potential impact if exploited. The EPSS score is less than 1%, reflecting a low current probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need to influence input that the theme processes—typically via query parameters or form data—to trigger the inclusion. The attack vector is remote via the web application, but the effect is confined to local file read unless other weaknesses are chained.

Generated by OpenCVE AI on April 29, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the ITok theme to any version newer than 1.1.42, which contains the vendor fix.
  • If an immediate upgrade is not feasible, modify or remove any theme code that passes user-supplied data to include or require statements, and implement strict path validation so only whitelisted directories can be included.
  • Apply PHP configuration protections such as disabling allow_url_include and setting open_basedir limits to restrict the files that the web application can read or execute.

Generated by OpenCVE AI on April 29, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme ITok itok.This issue affects ITok: from n/a through <= 1.1.42.
Title WordPress ITok theme <= 1.1.42 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:47:13.305Z

Reserved: 2025-10-07T15:34:03.910Z

Link: CVE-2025-62014

cve-icon Vulnrichment

Updated: 2025-11-07T14:06:42.461Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:08.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62014

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T14:00:12Z

Weaknesses