CVE-2025-39466
Published: 06 November 2025
Summary
CVE-2025-39466 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Qodeinteractive Dor. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the PHP Local File Inclusion flaw in the vulnerable Dør WordPress theme by applying patches or updates as advised in the Patchstack advisory.
Requires validation of user-supplied filenames in PHP include/require statements to prevent path traversal and unauthorized local file inclusion.
Enforces secure PHP configuration settings such as open_basedir restrictions and disabling allow_url_include to limit the scope of file inclusion exploits.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote file inclusion (LFI/RFI) in a public-facing WordPress theme, directly enabling exploitation of public-facing applications for high-impact compromise (C/I/A).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Dør dor allows PHP Local File Inclusion.This issue affects Dør: from n/a through <= 2.4.
Deeper analysisAI
CVE-2025-39466 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue, in the Mikado-Themes Dør WordPress theme. It enables PHP Local File Inclusion and affects Dør versions from n/a through 2.4. The vulnerability corresponds to CWE-98 and was published on 2025-11-06.
The attack vector is network-based (AV:N), with high attack complexity (AC:H), requiring no privileges (PR:N) or user interaction (UI:N), and no change in scope (S:U). A remote unauthenticated attacker can exploit it to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in a CVSS v3.1 base score of 8.1.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/dor/vulnerability/wordpress-doer-2-4-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)