CVE-2025-67955
Published: 22 January 2026
Summary
CVE-2025-67955 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress plugin directly enables server-side exploitation for initial access and potential code execution via malicious file inclusion.
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in TangibleWP MyHome Core myhome-core allows PHP Local File Inclusion.This issue affects MyHome Core: from n/a through <= 4.1.0.
Deeper analysisAI
CVE-2025-67955 is an Improper Control of Filename for Include/Require Statement vulnerability in PHP programs, specifically enabling PHP Local File Inclusion (CWE-98), in the TangibleWP MyHome Core WordPress plugin (myhome-core). This issue affects all versions from n/a through 4.1.0. The vulnerability carries a CVSS v3.1 base score of 7.5 (High), with the vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H.
An attacker with low privileges, such as an authenticated user, can exploit this over the network with high attack complexity and no user interaction required. Successful exploitation grants high impacts on confidentiality, integrity, and availability, allowing inclusion of local PHP files which could result in unauthorized access to sensitive data or potential code execution.
The Patchstack advisory provides details on this vulnerability, including mitigation guidance, at https://patchstack.com/database/Wordpress/Plugin/myhome-core/vulnerability/wordpress-myhome-core-plugin-4-1-0-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)