CVE-2025-32595
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-09

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Krowd krowd allows PHP Local File Inclusion.This issue affects Krowd: from n/a through < 1.5.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-09
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-32595 is a Local File Inclusion (LFI) vulnerability in the WordPress Krowd Theme versions up to 1.4.1. It allows an unauthenticated attacker to include and display local files from the target website. This means the attacker can access sensitive files on the server, such as those containing database credentials, by exploiting improper control of filename inputs in PHP include/require statements. [1]


How can this vulnerability impact me? :

This vulnerability can have a severe impact by allowing attackers to read sensitive files on your server, potentially exposing database credentials and other confidential information. This could lead to a complete database takeover depending on your website's configuration. The vulnerability is highly dangerous and expected to be widely exploited, which could result in data breaches, website defacement, or further compromise of your server. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this Local File Inclusion vulnerability can involve monitoring for unusual HTTP requests attempting to include local files via the vulnerable WordPress Krowd theme. Network or web server logs should be inspected for suspicious URL parameters that try to exploit file inclusion, such as requests containing file paths or traversal sequences. Additionally, professional incident response and server-side malware scanning are recommended to identify potential compromises. Specific commands are not provided in the resources, but reviewing web server access logs (e.g., using grep to search for suspicious patterns) and employing server-side scanning tools are advised. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the virtual patch (vPatch) provided by Patchstack, which blocks attacks exploiting this vulnerability until an official fix is released. It is recommended to implement this virtual patch promptly to protect affected sites. Additionally, professional incident response and server-side malware scanning should be conducted if compromise is suspected. Reliance on plugin-based malware scanners is discouraged as they can be tampered with. Since no official fix or patched version is currently available, the virtual patch is the best immediate protection. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart