On December 23, 2025, two vulnerabilities were publicly disclosed in the TheGem Theme Elements plugin for Elementor, a popular tool for building WordPress websites. The flaws expose websites to significant risk. The first, CVE-2025-68560, is a high-severity Remote File Inclusion (RFI) vulnerability (CVSS 7.5) that could lead to full server compromise. The second, CVE-2025-68559, is a medium-severity Cross-Site Scripting (XSS) vulnerability (CVSS 6.5). All versions of the plugin up to and including 5.10.5.1 are affected. Website administrators are strongly advised to update the plugin to a patched version immediately to prevent potential exploitation.
include or require statements within the plugin's PHP code. An attacker can manipulate input to cause the server to include and execute a PHP file hosted on a remote server. Successful exploitation typically leads to arbitrary code execution with the permissions of the web server process, resulting in a complete compromise of the website and potentially the underlying server.The RFI vulnerability (CVE-2025-68560) is the more critical of the two. It likely exists in a function that takes a user-supplied parameter (e.g., from a URL query string or POST body) and uses it directly in a PHP include() statement. An attacker could provide a URL to their own malicious PHP script (e.g., http://attacker.com/shell.txt) as the parameter value, causing the WordPress server to fetch and execute it.
The XSS vulnerability (CVE-2025-68559) is a classic stored or reflected XSS flaw where input is not properly escaped using functions like htmlspecialchars() before being displayed to the user.
T1190 - Exploit Public-Facing Application (for CVE-2025-68560)T1059.007 - JavaScript (for CVE-2025-68559)T1059.005 - Visual Basic (if PHP webshell is used)T1505.003 - Web Shell (A common outcome of RFI exploitation)Exploitation of CVE-2025-68560 can lead to a full website takeover. Attackers can steal sensitive data from the website's database (including user credentials), deface the site, inject malware to attack visitors (drive-by downloads), or use the compromised server to send spam or participate in DDoS attacks. The impact is severe.
Exploitation of CVE-2025-68559 primarily affects the website's users. It can lead to account takeover for logged-in users (including administrators) if session cookies are stolen, compromising the integrity of the site.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
url_pattern |
?file=http:// or ?file=// |
A common pattern for file inclusion exploit attempts in URL parameters. | WAF logs, Web server access logs | high |
url_pattern |
<script>, alert(), onerror= |
Common strings used in XSS exploit attempts found in URL parameters or POST bodies. | WAF logs, Web server access logs | high |
file_name |
*.php in upload directories |
Unexpected PHP files in directories like /wp-content/uploads/ can be a sign of a webshell. |
File Integrity Monitoring (FIM) | high |
network_traffic_pattern |
Outbound requests from web server to unusual IPs/domains. | The web server attempting to connect to an external server to download a remote file for an RFI attack. | Egress firewall logs, NIDS | high |
D3-ITF: Inbound Traffic Filtering.D3-SU: Software Update.php.ini file has allow_url_fopen and allow_url_include set to Off. This prevents PHP from fetching remote files via include/require statements, breaking most RFI exploits. This is a key part of D3-PH: Platform Hardening.
Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats