CVE-2025-53447
Published: 18 December 2025
Summary
CVE-2025-53447 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Axiomthemes Assembly. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-53447 by requiring timely remediation and patching of the vulnerable Assembly WordPress theme versions <=1.1.
Prevents exploitation of the PHP Local File Inclusion vulnerability by validating filename inputs used in include/require statements against malicious local paths.
Mitigates the vulnerability through secure PHP and web server configuration settings, such as open_basedir restrictions to limit accessible file paths.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote LFI vulnerability in public-facing WordPress theme enables exploitation of public-facing application (T1190) and arbitrary local file access (T1005).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Assembly assembly allows PHP Local File Inclusion.This issue affects Assembly: from n/a through <= 1.1.
Deeper analysisAI
CVE-2025-53447 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and labeled as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Assembly WordPress theme developed by axiomthemes, impacting all versions from n/a through 1.1 inclusive. The vulnerability was published on 2025-12-18 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
An unauthenticated remote attacker can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing the inclusion of arbitrary local files on the affected server.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/assembly/vulnerability/wordpress-assembly-theme-1-1-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)