CVE-2025-69005
Published: 22 January 2026
Summary
CVE-2025-69005 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user-supplied filename inputs in PHP include/require statements to block arbitrary local file inclusion attacks.
Mandates timely identification, reporting, and patching of the specific LFI flaw in the Search & Go WordPress theme versions through 2.8.
Enforces restrictive PHP configuration settings like open_basedir to limit accessible file paths and mitigate LFI exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remotely exploitable Local File Inclusion (LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing application for unauthorized file access, modification, or DoS.
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Search & Go search-and-go allows PHP Local File Inclusion.This issue affects Search & Go: from n/a through <= 2.8.
Deeper analysisAI
CVE-2025-69005 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the Elated-Themes Search & Go WordPress theme. This issue affects versions from n/a through 2.8, with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability was published on 2026-01-22.
Remote attackers can exploit this vulnerability over the network with high attack complexity, requiring no privileges or user interaction. Exploitation allows inclusion of arbitrary local files via crafted requests, resulting in high impacts to confidentiality, integrity, and availability, potentially leading to unauthorized access, data disclosure, or code execution on the affected server.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/search-and-go/vulnerability/wordpress-search-go-theme-2-8-local-file-inclusion-vulnerability?_s_id=cve documents this Local File Inclusion vulnerability in Search & Go theme version 2.8 and provides details on affected installations.
Details
- CWE(s)