CVE-2025-8913
Published: 13 August 2025
Summary
CVE-2025-8913 is a critical-severity PHP Remote File Inclusion (CWE-98) vulnerability in Wellchoose Organization Portal System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 26.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents LFI exploitation by validating user inputs to block path traversal and arbitrary local file inclusion leading to RCE.
Mitigates the specific LFI vulnerability through timely identification, patching, and remediation of the flaw in the Organization Portal System.
Enforces logical access controls to restrict unauthorized reading of local files that could be exploited via the LFI vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing web portal directly enables unauthenticated remote code execution via exploitation of the application.
NVD Description
Organization Portal System developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.
Deeper analysisAI
CVE-2025-8913 is a Local File Inclusion (LFI) vulnerability, classified under CWE-98, in the Organization Portal System developed by WellChoose. Published on 2025-08-13, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its high impact on confidentiality, integrity, and availability. The flaw enables unauthenticated remote attackers to include local files in a way that leads to arbitrary code execution on the affected server.
Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants remote code execution (RCE) on the server, potentially allowing full compromise of the system, data exfiltration, or further lateral movement within the environment.
Mitigation details are provided in advisories from the Taiwan CERT, accessible at https://www.twcert.org.tw/en/cp-139-10325-70192-2.html and https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html. Security practitioners should consult these for specific patch information, workarounds, or configuration changes to address the vulnerability.
Details
- CWE(s)