Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Gallery allows Using Malicious Files. This issue affects FW Gallery: f...
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Gallery allows Using Malicious Files. This issue affects FW Gallery: from n/a through 8.0.0.
Remediation
Update Unrestricted Upload of File with Dangerous Type vulnerability in Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in multiple favethemes Houzez products, assigned CVE-2025-49405. This flaw allows an attacker to trick the application into including and potentially executing unintended files from the local server, which could lead to sensitive information disclosure or further system compromise. Organizations using the affected software are at significant risk and should apply vendor-supplied patches immediately.
Vulnerability Details
CVE-ID: CVE-2025-49405
Affected Software: favethemes Houzez Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is a Local File Inclusion (LFI) flaw resulting from an Improper Control of a Filename for an Include/Require Statement in the PHP code. An attacker can manipulate an input parameter, likely in a URL, to specify a path to a file on the server's local file system. The application will then include the contents of this specified file, which could be executed if it contains PHP code or displayed to the attacker if it is a text-based file, such as a configuration file containing database credentials or system files like
/etc/passwd.Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could have a significant business impact, including the breach of sensitive data stored on the server, such as customer information, intellectual property, or system credentials. This can lead to severe financial loss, regulatory fines, and reputational damage. If an attacker can leverage this LFI to achieve code execution (for instance, by including a previously uploaded file), they could gain full control over the affected web server, enabling them to pivot further into the corporate network.
Remediation Plan
Immediate Action: Apply the security updates provided by the vendor, favethemes, immediately across all affected systems. After patching, it is crucial to monitor for any signs of exploitation attempts by reviewing web server and application access logs for suspicious activity that may have occurred prior to the patch.
Proactive Monitoring: Security teams should actively monitor web server logs for common LFI attack patterns. Look for requests containing directory traversal sequences (e.g.,
../,..\/), absolute file paths (e.g.,/etc/passwd,C:\windows\system.ini), and attempts to include PHP wrappers likephp://filter. An increase in HTTP 404 or 500 error codes from specific IP addresses could indicate an attacker probing for this vulnerability.Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block LFI and directory traversal attack patterns. Additionally, enforce strict file system permissions to ensure the web server process can only read/write to its designated directories, limiting the impact of a successful LFI exploit.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 28, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities of this type in popular products are often quickly reverse-engineered by threat actors. The CVE description mentions 'PHP Remote File Inclusion' but clarifies the impact is 'PHP Local File Inclusion', which is a critical distinction, as it typically requires the attacker to access files already on the server rather than from an external source.
Analyst Recommendation
Given the high CVSS score of 8.1, it is strongly recommended that organizations prioritize the immediate application of the vendor-supplied patches. While this vulnerability is not currently listed on the CISA KEV list and no public exploits are available, the risk of future exploitation is high. Proactive patching is the most effective defense to prevent potential data breaches and system compromise resulting from this vulnerability.