CVE-2025-69073
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-01-29

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Piqes piqes allows PHP Local File Inclusion.This issue affects Piqes: from n/a through <= 1.0.11.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-01-29
Generated
2026-05-06
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ancorathemes piqes to 1.0.11 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-69073 is a Local File Inclusion (LFI) vulnerability in the WordPress Piqes Theme (versions up to 1.0.11). It allows an unauthenticated attacker to include and display local files from the target website. This can expose sensitive information such as database credentials. The vulnerability arises from improper control of filenames used in include/require statements in PHP, enabling attackers to inject local files. [1]


How can this vulnerability impact me? :

This vulnerability can have a severe impact by allowing attackers to access sensitive files on the server, potentially exposing database credentials and other confidential data. Depending on the website's configuration, exploitation could lead to a complete database takeover. Since no authentication is required to exploit this flaw, it poses a high risk to affected websites. [1]


What immediate steps should I take to mitigate this vulnerability?

Apply the mitigation rule provided by Patchstack immediately to block attacks exploiting this vulnerability, as no official fix has been released yet. Users are strongly advised to implement this automated mitigation solution to protect their websites running the affected Piqes theme versions up to 1.0.11. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated attackers to include and display local files from the target website, potentially exposing sensitive information such as database credentials. Such exposure could lead to a complete database takeover depending on the website's configuration. This risk of sensitive data exposure and unauthorized access could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data. Therefore, exploitation of this vulnerability may result in non-compliance due to data breaches or inadequate data protection controls. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The provided resources do not include specific commands or detailed methods for detecting this vulnerability on your network or system. However, it is known that this Local File Inclusion (LFI) vulnerability affects the Piqes WordPress theme up to version 1.0.11 and can be exploited without authentication. To detect exploitation attempts, monitoring web server logs for suspicious requests attempting to include local files via the theme's parameters could be useful. Additionally, applying the mitigation rule provided by Patchstack can help block attacks exploiting this vulnerability until an official patch is released. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart