CVE-2025-69068
Published: 22 January 2026
Summary
CVE-2025-69068 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by identifying, reporting, and patching the improper filename control in the Muji theme's PHP include/require statements.
Validates filenames supplied to PHP include/require functions to block path traversal and local file inclusion exploits.
Enforces least privilege on the web server process to restrict access to sensitive local files even if LFI is attempted.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI/RFI in public-facing WordPress theme directly enables T1190 (public app exploitation) for unauthenticated remote access; facilitates T1005 (local file reads) and T1100 (web shell/code exec via PHP include).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Muji muji allows PHP Local File Inclusion.This issue affects Muji: from n/a through <= 1.2.0.
Deeper analysisAI
CVE-2025-69068 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, that allows PHP Local File Inclusion in the Muji WordPress theme developed by AncoraThemes. This issue affects Muji versions from n/a through 1.2.0. The vulnerability is associated with CWE-98 and carries a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility and significant impacts despite high attack complexity.
Unauthenticated remote attackers (PR:N) can exploit this vulnerability over the network (AV:N) without user interaction (UI:N), though it requires high attack complexity (AC:H). Successful exploitation enables high confidentiality (C:H), integrity (I:H), and availability (A:H) impacts, such as reading sensitive local files or potentially executing arbitrary code if traversable paths lead to executable PHP files.
Mitigation details are available in advisories including the Patchstack database entry at https://patchstack.com/database/Wordpress/Theme/muji/vulnerability/wordpress-muji-theme-1-2-0-local-file-inclusion-vulnerability?_s_id=cve. The vulnerability was published on 2026-01-22T17:16:20.820.
Details
- CWE(s)