First published: Wed Jan 22 2025(Updated: )
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebArea Background animation blocks allows PHP Local File Inclusion. This issue affects Background animation blocks: from n/a through 2.1.5.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebArea Background animation blocks | <=2.1.5 | |
WordPress Background Animation Blocks Plugin | <=2.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23948 is considered a high severity vulnerability due to its potential for local file inclusion, which could lead to unauthorized access to sensitive data.
To fix CVE-2025-23948, update the WebArea Background animation blocks plugin to the latest version beyond 2.1.5 that addresses the vulnerability.
CVE-2025-23948 affects versions of the WebArea Background animation blocks as well as the WordPress Background animation blocks Plugin up to version 2.1.5.
Yes, CVE-2025-23948 can potentially lead to remote attacks through local file inclusion, allowing an attacker to execute arbitrary code.
Yes, a patch is available; users are advised to update to the latest version of the software that resolves the CVE-2025-23948 vulnerability.