CVE-2025-67937
Published: 08 January 2026
Summary
CVE-2025-67937 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Qodeinteractive Hendon. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely remediation of the PHP Local File Inclusion flaw through updating the vulnerable Hendon theme to version 1.7 or later.
Addresses the core issue of improper filename control in PHP include/require statements by enforcing input validation mechanisms to block malicious file paths.
Enables identification of the CVE-2025-67937 vulnerability in installed WordPress themes through regular vulnerability scanning and monitoring.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme directly enables remote exploitation of web application (T1190) and facilitates web shell deployment or arbitrary PHP code execution (T1505.003).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Hendon hendon allows PHP Local File Inclusion.This issue affects Hendon: from n/a through < 1.7.
Deeper analysisAI
CVE-2025-67937 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Mikado-Themes Hendon WordPress theme. This issue affects all versions of the Hendon theme from n/a through those prior to 1.7. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.
The vulnerability can be exploited remotely by unauthenticated attackers over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially enabling local file inclusion that could lead to arbitrary code execution or sensitive data exposure on affected WordPress sites running vulnerable Hendon theme versions.
The Patchstack advisory details this as a Local File Inclusion vulnerability in the WordPress Hendon theme, addressed in version 1.7. Mitigation involves updating the Hendon theme to version 1.7 or later on all affected WordPress installations.
Details
- CWE(s)