Cyber Posture

CVE-2025-39466

High

Published: 06 November 2025

Published
06 November 2025
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-39466 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Qodeinteractive Dor. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the PHP Local File Inclusion flaw in the vulnerable Dør WordPress theme by applying patches or updates as advised in the Patchstack advisory.

prevent

Requires validation of user-supplied filenames in PHP include/require statements to prevent path traversal and unauthorized local file inclusion.

prevent

Enforces secure PHP configuration settings such as open_basedir restrictions and disabling allow_url_include to limit the scope of file inclusion exploits.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated remote file inclusion (LFI/RFI) in a public-facing WordPress theme, directly enabling exploitation of public-facing applications for high-impact compromise (C/I/A).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Dør dor allows PHP Local File Inclusion.This issue affects Dør: from n/a through <= 2.4.

Deeper analysisAI

CVE-2025-39466 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue, in the Mikado-Themes Dør WordPress theme. It enables PHP Local File Inclusion and affects Dør versions from n/a through 2.4. The vulnerability corresponds to CWE-98 and was published on 2025-11-06.

The attack vector is network-based (AV:N), with high attack complexity (AC:H), requiring no privileges (PR:N) or user interaction (UI:N), and no change in scope (S:U). A remote unauthenticated attacker can exploit it to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in a CVSS v3.1 base score of 8.1.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/dor/vulnerability/wordpress-doer-2-4-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

Affected Products

qodeinteractive
dor
≤ 2.4.1

CVEs Like This One

CVE-2025-67935Same vendor: Qodeinteractive
CVE-2025-67937Same vendor: Qodeinteractive
CVE-2025-67936Same vendor: Qodeinteractive
CVE-2025-67934Same vendor: Qodeinteractive
CVE-2025-67515Same vendor: Qodeinteractive
CVE-2025-69034Same vendor: Qodeinteractive
CVE-2025-53334Shared CWE-98
CVE-2025-53567Shared CWE-98
CVE-2025-14475Shared CWE-98
CVE-2025-69076Shared CWE-98

References