Cyber Posture

CVE-2025-67937

High

Published: 08 January 2026

Published
08 January 2026
Modified
03 February 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 20.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67937 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Qodeinteractive Hendon. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely remediation of the PHP Local File Inclusion flaw through updating the vulnerable Hendon theme to version 1.7 or later.

prevent

Addresses the core issue of improper filename control in PHP include/require statements by enforcing input validation mechanisms to block malicious file paths.

detect

Enables identification of the CVE-2025-67937 vulnerability in installed WordPress themes through regular vulnerability scanning and monitoring.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

LFI vulnerability in public-facing WordPress theme directly enables remote exploitation of web application (T1190) and facilitates web shell deployment or arbitrary PHP code execution (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Hendon hendon allows PHP Local File Inclusion.This issue affects Hendon: from n/a through < 1.7.

Deeper analysisAI

CVE-2025-67937 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Mikado-Themes Hendon WordPress theme. This issue affects all versions of the Hendon theme from n/a through those prior to 1.7. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.

The vulnerability can be exploited remotely by unauthenticated attackers over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially enabling local file inclusion that could lead to arbitrary code execution or sensitive data exposure on affected WordPress sites running vulnerable Hendon theme versions.

The Patchstack advisory details this as a Local File Inclusion vulnerability in the WordPress Hendon theme, addressed in version 1.7. Mitigation involves updating the Hendon theme to version 1.7 or later on all affected WordPress installations.

Details

CWE(s)

Affected Products

qodeinteractive
hendon
≤ 1.7

CVEs Like This One

CVE-2025-67935Same vendor: Qodeinteractive
CVE-2025-39466Same vendor: Qodeinteractive
CVE-2025-67936Same vendor: Qodeinteractive
CVE-2025-67934Same vendor: Qodeinteractive
CVE-2025-67515Same vendor: Qodeinteractive
CVE-2025-69034Same vendor: Qodeinteractive
CVE-2025-58214Shared CWE-98
CVE-2025-54701Shared CWE-98
CVE-2025-7327Shared CWE-98
CVE-2026-27894Shared CWE-98

References