CVE-2025-62010
Published: 06 November 2025
Summary
CVE-2025-62010 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper control of filenames in PHP include/require statements by requiring validation of inputs to prevent local file inclusion attacks.
Requires timely identification, reporting, and remediation of flaws like this PHP LFI vulnerability in the Famita WordPress theme to prevent exploitation.
Enforces secure configuration settings for PHP and the web application, such as open_basedir restrictions, to limit file inclusion capabilities and mitigate LFI risks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Public-facing WordPress theme LFI vulnerability enables exploitation of public-facing applications (T1190), reading sensitive local files including credentials (T1005, T1552.001).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme Famita famita allows PHP Local File Inclusion.This issue affects Famita: from n/a through <= 1.54.
Deeper analysisAI
CVE-2025-62010 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the ApusTheme Famita WordPress theme. This issue affects Famita versions from n/a through 1.54 and is associated with CWE-98. The vulnerability was published on 2025-11-06 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated remote attackers can exploit this vulnerability over the network without user interaction, though it requires high attack complexity. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially through local file inclusion leading to unauthorized file access or execution.
Mitigation details are provided in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/famita/vulnerability/wordpress-famita-theme-1-54-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)