CVE-2025-67515
Published: 09 December 2025
Summary
CVE-2025-67515 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Qodeinteractive Wilmer. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates filenames used in PHP include/require statements to prevent local file inclusion by rejecting invalid or malicious inputs.
Remediates the specific flaw in the Wilmër theme by applying patches or updates to version 3.5 or later.
Enforces secure configuration settings for PHP, such as restricting file paths or disabling dangerous functions, to limit local file inclusion exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote LFI in public-facing WordPress theme enables exploitation of public-facing application (T1190) and reading sensitive local files (T1005).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Wilmër wilmer allows PHP Local File Inclusion.This issue affects Wilmër: from n/a through < 3.5.
Deeper analysisAI
CVE-2025-67515 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Local File Inclusion (CWE-98), affecting the Wilmër WordPress theme developed by Mikado-Themes. The flaw enables local file inclusion through inadequate validation of filenames used in PHP include or require statements. It impacts all versions of the Wilmër theme from n/a through those prior to 3.5, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility and significant impacts on confidentiality, integrity, and availability.
An attacker with low privileges, such as an authenticated WordPress user, can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows the attacker to include and potentially execute arbitrary local files on the server, leading to high-level compromise including data exfiltration, code execution, or system disruption.
The Patchstack advisory for this vulnerability, available at the referenced URL, details the local file inclusion issue in the Wilmër theme and recommends updating to version 3.5 or later, where the flaw has been addressed.
Details
- CWE(s)