Cyber Posture

CVE-2025-67955

High

Published: 22 January 2026

Published
22 January 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67955 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

LFI vulnerability in public-facing WordPress plugin directly enables server-side exploitation for initial access and potential code execution via malicious file inclusion.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in TangibleWP MyHome Core myhome-core allows PHP Local File Inclusion.This issue affects MyHome Core: from n/a through <= 4.1.0.

Deeper analysisAI

CVE-2025-67955 is an Improper Control of Filename for Include/Require Statement vulnerability in PHP programs, specifically enabling PHP Local File Inclusion (CWE-98), in the TangibleWP MyHome Core WordPress plugin (myhome-core). This issue affects all versions from n/a through 4.1.0. The vulnerability carries a CVSS v3.1 base score of 7.5 (High), with the vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H.

An attacker with low privileges, such as an authenticated user, can exploit this over the network with high attack complexity and no user interaction required. Successful exploitation grants high impacts on confidentiality, integrity, and availability, allowing inclusion of local PHP files which could result in unauthorized access to sensitive data or potential code execution.

The Patchstack advisory provides details on this vulnerability, including mitigation guidance, at https://patchstack.com/database/Wordpress/Plugin/myhome-core/vulnerability/wordpress-myhome-core-plugin-4-1-0-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2025-53334Shared CWE-98
CVE-2025-53567Shared CWE-98
CVE-2025-14475Shared CWE-98
CVE-2025-69076Shared CWE-98
CVE-2025-69005Shared CWE-98
CVE-2026-22370Shared CWE-98
CVE-2026-28119Shared CWE-98
CVE-2024-56281Shared CWE-98
CVE-2025-69396Shared CWE-98
CVE-2025-53578Shared CWE-98

References