CVE-2025-39592: WordPress Subscribe to Unlock Lite <= 1.3.0 - Local File Inclusion Vulnerability

7.5 CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Shuffle Subscribe to Unlock Lite allows PHP Local File Inclusion. This issue affects Subscribe to Unlock Lite: from n/a through 1.3.0.

Classification

CVE ID: CVE-2025-39592

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem Types

CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Affected Products

Vendor: WP Shuffle

Product: Subscribe to Unlock Lite

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.11% (probability of being exploited)

EPSS Percentile: 31.41% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-39592
https://patchstack.com/database/wordpress/plugin/subscribe-to-unlock-lite/vulnerability/wordpress-subscribe-to-unlock-lite-1-3-0-local-file-inclusion-vulnerability?_s_id=cve

Timeline