CVE-2025-60066
📋 TL;DR
This vulnerability allows attackers to include local PHP files through improper filename control in the Katelyn WordPress theme. Attackers can potentially read sensitive files or execute arbitrary code on affected WordPress installations. All WordPress sites using Katelyn theme versions up to and including 1.0.10 are affected.
💻 Affected Systems
- axiomthemes Katelyn WordPress Theme
📦 What is this software?
Katelyn by Axiomthemes
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete server compromise, data theft, and website defacement.
Likely Case
Sensitive file disclosure (configuration files, database credentials) and limited code execution.
If Mitigated
No impact if proper file permissions and web server configurations prevent file inclusion.
🎯 Exploit Status
Exploitation requires sending crafted HTTP requests to vulnerable endpoints. Public exploit details available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: >1.0.10
Vendor Advisory: https://patchstack.com/database/Wordpress/Theme/katelyn/vulnerability/wordpress-katelyn-theme-1-0-10-local-file-inclusion-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Update Katelyn theme to latest version via WordPress admin panel. 2. Verify theme version is >1.0.10. 3. Clear any caching plugins/CDN.
🔧 Temporary Workarounds
Disable vulnerable theme
allSwitch to default WordPress theme until patch is applied
wp theme activate twentytwentyfour
Web Application Firewall rule
allBlock requests containing local file inclusion patterns
🧯 If You Can't Patch
- Implement strict file permissions (644 for files, 755 for directories)
- Use web server configuration to restrict PHP file inclusion (disable allow_url_include)
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Appearance > Themes for Katelyn theme version <=1.0.10
Check Version:
wp theme list --field=name,status,version | grep katelyn
Verify Fix Applied:
Verify theme version is >1.0.10 and test vulnerable endpoints with controlled payloads
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with suspicious file paths in parameters
- PHP include/require errors in web server logs
Network Indicators:
- Unusual file path patterns in HTTP GET/POST parameters
- Requests to theme-specific endpoints with file parameters
SIEM Query:
source="web_access.log" AND (uri="*katelyn*" AND (param="*../*" OR param="*php://*" OR param="*file=*"))