CVE-2025-49256
BaseFortify
Publication date: 2025-06-17
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-98 | The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Local File Inclusion (LFI) flaw in the WordPress Sapa Theme up to version 1.1.14. It allows unauthenticated attackers to include and display local files from the target website by exploiting improper control of filenames in PHP include/require statements. This can expose sensitive files such as those containing database credentials, potentially leading to a complete database takeover depending on the website's configuration. [1]
How can this vulnerability impact me? :
Exploiting this vulnerability can allow attackers to access sensitive files on your website, such as database credentials, which may lead to a complete takeover of your database. Since the vulnerability requires no authentication and has a high severity score, it is highly exploitable and likely to be targeted by automated attacks, putting your website's confidentiality, integrity, and availability at serious risk. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for exploit attempts that try to include local files via the vulnerable Sapa theme. Patchstack provides a virtual patch that blocks exploit attempts, which can help in detection. Additionally, professional incident response or server-side malware scanning is recommended rather than relying solely on plugin-based scanners. Specific commands are not provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the Patchstack virtual patch (vPatch) to block exploit attempts and promptly updating the Sapa theme to version 1.1.15 or later, where the vulnerability is fixed. If the system is compromised, seek professional incident response and perform server-side malware scanning. [1]