CVE-2025-68539
Awaiting Analysis Awaiting Analysis - Queue
Local File Inclusion in thembay Fana <= 1.1.35 PHP Program

Publication date: 2026-02-20

Last updated on: 2026-02-24

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Fana fana allows PHP Local File Inclusion.This issue affects Fana: from n/a through <= 1.1.35.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-02-24
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
patchstack fana to 1.1.35 (inc)
thembay fana to 1.1.35 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-68539 is a Local File Inclusion (LFI) vulnerability found in the WordPress Fana Theme versions up to and including 1.1.35.

This vulnerability allows unauthenticated attackers to include and display local files from the target website by exploiting improper control of filename parameters in PHP include/require statements.

Because of this, attackers can access sensitive files on the server, such as those containing database credentials.


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to exposure of sensitive local files on the server.

This may include files with database credentials, which could allow an attacker to take over the entire database depending on the server configuration.

Since no privileges are required to exploit this vulnerability, it poses a high risk to affected systems.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability allows unauthenticated attackers to include and display local files via the WordPress Fana Theme versions up to 1.1.35. Detection can focus on monitoring for suspicious HTTP requests attempting to exploit Local File Inclusion (LFI) patterns targeting the theme.'}, {'type': 'list_item', 'content': 'Use web server access logs to search for requests containing suspicious parameters that include local file paths, such as "../../" sequences or attempts to include sensitive files like /etc/passwd.'}, {'type': 'list_item', 'content': 'Example command to search Apache or Nginx logs for LFI attempts: grep -E "(\\.{2}/)+" /var/log/apache2/access.log'}, {'type': 'list_item', 'content': 'Use intrusion detection systems (IDS) or web application firewalls (WAF) with rules to detect and block LFI patterns targeting the Fana Theme.'}, {'type': 'list_item', 'content': 'Patchstack provides an automatic mitigation rule that can be applied to block exploitation attempts, which can also aid in detection.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary and recommended mitigation is to update the WordPress Fana Theme to version 1.1.36 or later, where the vulnerability is patched.

If immediate updating is not possible, apply Patchstack’s automatic mitigation rules to block exploitation attempts and provide rapid protection against this Local File Inclusion vulnerability.

Additionally, monitor your web server logs for suspicious activity and consider implementing or tuning web application firewall rules to detect and block LFI attack patterns.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart