Overview
A high-severity vulnerability, CVE-2025-39507, has been identified in NasaTheme’s Nasa Core. The PHP Remote File Inclusion vulnerability, which holds a CVSS Severity Score of 7.5, exposes the system to potential compromise and data leakage. Anyone using Nasa Core versions through 6.3.2 is at risk and should take immediate action to mitigate the threat.
Vulnerability Summary
CVE ID: CVE-2025-39507
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: Possible system compromise and data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
NasaTheme Nasa Core | n/a through 6.3.2
How the Exploit Works
The vulnerability originates from an improper control of a filename that is used in a PHP ‘include’ or ‘require’ statement. An attacker can manipulate the filename, leading to the PHP Local File Inclusion (LFI). This allows an attacker to include and execute arbitrary local files within the server context, which can lead to unauthorized system access, data leakage, and potentially full system compromise.
Conceptual Example Code
Below is a conceptual example of how the vulnerability might be exploited. This example represents a malicious HTTP request:
GET /index.php?page=../../../../../etc/passwd HTTP/1.1
Host: vulnerable-website.com
In this example, the attacker is attempting to traverse the directory to read the ‘/etc/passwd’ file, which is a common target in LFI attacks due to its potential to contain sensitive user information.
Mitigation and Recommendations
Users are advised to apply the patch provided by the vendor immediately. In the absence of a patch, or until one can be applied, it’s recommended to use a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) as a temporary mitigation measure to detect and block exploit attempts.

