CVE-2025-52812
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusWP Domnoo domnoo allows PHP Local File Inclusion.This issue affects Domnoo: from n/a through <= 1.49.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A PHP Local File Inclusion vulnerability in the WordPress Domnoo theme (≤1.49) allows unauthenticated attackers to read sensitive files via improper filename handling.
Vulnerability
Overview CVE-2025-52812 describes a PHP Local File Inclusion (LFI) vulnerability in the ApusWP Domnoo WordPress theme, affecting versions from n/a through 1.49. The root cause is improper control of filenames used in include/require statements, enabling an attacker to manipulate the path and include arbitrary local files on the server [1].
Exploitation and
Attack Surface The vulnerability can be exploited without authentication, making it accessible to any remote attacker. By crafting a specially request, an adversary can force the theme's PHP scripts to include unintended files from the server's filesystem, bypassing normal access controls [1]. The Patchstack advisory notes that this flaw is highly dangerous and expected to be targeted in mass-exploit campaigns, as it can be used to attack thousands of websites simultaneously regardless of their popularity [1].
Impact
Successful exploitation allows a malicious actor to read sensitive local files, such as wp-config.php which contains database credentials. Depending on server configuration, this could lead to complete database compromise [1]. The CVSS v3 score of 8.1 (High) reflects the low complexity, no privileges required, and high potential impact on confidentiality.
Mitigation
Status Users must update the Domnoo theme to version 1.52.1 or later, which resolves the vulnerability. For those unable to update immediately, Patchstack offers a mitigation rule to block exploitation attempts [1]. Given the expected mass-exploitation, applying the patch urgently is strongly recommended.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.