CVE-2026-25017
Received Received - Intake
Local File Inclusion in NaturaLife Extensions ≀ 2.1 Allows Code Execution

Publication date: 2026-03-25

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in stmcan NaturaLife Extensions naturalife-extensions allows PHP Local File Inclusion.This issue affects NaturaLife Extensions: from n/a through <= 2.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
naturalife_extensions naturalife_extensions to 2.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Local File Inclusion vulnerability in NaturaLife Extensions Plugin allows attackers to access sensitive information such as database credentials, which could lead to a complete database takeover. Exposure or compromise of sensitive data can result in non-compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information.

Failure to patch this vulnerability promptly may lead to unauthorized data access or breaches, potentially violating regulatory requirements for data confidentiality, integrity, and security.


Can you explain this vulnerability to me?

CVE-2026-25017 is a Local File Inclusion (LFI) vulnerability in the WordPress NaturaLife Extensions Plugin versions up to 2.1. This vulnerability allows unauthenticated attackers to include and display local files from the target website. Essentially, attackers can exploit improper control of filenames used in include or require statements in PHP, which can lead to unauthorized access to sensitive files on the server.

The vulnerability is classified under the OWASP Top 10 category A3: Injection and has a high severity score of 8.1. It was reported by JoΓ£o Pedro S AlcΓ’ntara and publicly disclosed by Patchstack in March 2026.


How can this vulnerability impact me? :

Exploitation of this vulnerability can allow attackers to include and view local files on the affected website, potentially exposing sensitive information such as database credentials.

Depending on the website's configuration, this could lead to a complete database takeover, allowing attackers to manipulate or steal data.

Because the vulnerability is expected to be widely exploited in mass campaigns, failing to patch it promptly could result in large-scale attacks against vulnerable sites.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability allows unauthenticated attackers to include and display local files from the target website, which may expose sensitive information. Detection can involve monitoring web server logs for suspicious requests attempting to include local files via the NaturaLife Extensions plugin.

Specific commands are not provided in the available resources, but common detection methods include searching for unusual URL parameters or payloads targeting the plugin, such as requests containing file inclusion patterns.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the NaturaLife Extensions Plugin to version 2.2 or later, which contains the patch for this Local File Inclusion vulnerability.

Until the update is applied, Patchstack provides an automatic mitigation rule to block attacks targeting this vulnerability.

Additionally, enabling auto-update options for the plugin can help ensure that vulnerable versions are promptly replaced.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart