CVE-2025-64359
BaseFortify
Publication date: 2025-10-31
Last updated on: 2026-04-27
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| stylemixthemes | consulting | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-98 | The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper control of filename for include/require statements in the StylemixThemes Consulting PHP program, leading to a PHP Local File Inclusion issue. It allows an attacker to include files on the server that should not be accessible, potentially exposing sensitive information or enabling further attacks.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to access sensitive files on your server, which can lead to information disclosure. Although it does not directly affect integrity or availability, the exposure of confidential data can have serious consequences.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability can negatively affect compliance with standards like GDPR and HIPAA because it may lead to unauthorized disclosure of sensitive personal or protected health information, violating data protection requirements.