Cyber Posture

CVE-2025-59564

High

Published: 22 October 2025

Published
22 October 2025
Modified
29 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-59564 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Thememove Edumall. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Requires timely remediation of flaws, directly addressing this LFI vulnerability by patching EduMall to version 4.4.5 or later.

prevent

Mandates validation of inputs like filenames used in PHP include/require statements to block malicious local file inclusion paths.

prevent

Enforces secure PHP configuration settings such as open_basedir restrictions to limit filesystem access and mitigate LFI exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Unauthenticated remote LFI in public-facing WordPress theme enables T1190 (Exploit Public-Facing Application) and facilitates T1005 (Data from Local System) via arbitrary local file reads.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove EduMall edumall allows PHP Local File Inclusion.This issue affects EduMall: from n/a through < 4.4.5.

Deeper analysisAI

CVE-2025-59564 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and described as enabling PHP Local File Inclusion, in the ThemeMove EduMall WordPress theme. The issue affects EduMall versions from n/a through those prior to 4.4.5.

Unauthenticated remote attackers (AV:N/PR:N/UI:N) can exploit this vulnerability over the network with high attack complexity (AC:H) and unchanged scope (S:U), potentially achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in a CVSS v3.1 base score of 8.1.

The Patchstack advisory details this Local File Inclusion vulnerability in the WordPress EduMall theme and indicates it is addressed in version 4.4.5.

Details

CWE(s)

Affected Products

thememove
edumall
≤ 4.4.5

CVEs Like This One

CVE-2025-60069Same vendor: Thememove
CVE-2025-59555Same vendor: Thememove
CVE-2025-58958Same vendor: Thememove
CVE-2025-59558Same vendor: Thememove
CVE-2025-14430Same vendor: Thememove
CVE-2025-54700Same vendor: Thememove
CVE-2025-22708Same vendor: Thememove
CVE-2025-22707Same vendor: Thememove
CVE-2025-14429Same vendor: Thememove
CVE-2025-54701Same vendor: Thememove

References