Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes OchaHouse ochahouse allows PHP Local File Inclusion.This issue affects OchaHouse: from n/a through <= 2.2.8.
Published: 2026-01-08
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The OchaHouse theme contains an improper control of filename for include/require in its PHP code, enabling local file inclusion. This flaw may allow an attacker to read arbitrary local files or to execute arbitrary PHP code if a writable directory contains a file that the attacker can trigger. The weakness is identified as CWE-98. The impact can include leakage of sensitive configuration data or full server compromise if an attacker succeeds.

Affected Systems

The vulnerability affects the jwsthemes OchaHouse theme for WordPress, versions up to and including 2.2.8. Users running any OchaHouse installation with a version not newer than 2.2.8 are potentially exposed.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity. The EPSS score of less than 1% suggests that the probability of exploitation observed in the field is currently very low, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, the potential for remote code execution or information disclosure warrants prompt action. An attacker could exploit the flaw by supplying a crafted request that directs the theme to include a local path; the exact vector is not specified in the advisory, so the likely vector is through user-supplied parameters that influence the include path, which is inferred from the nature of the vulnerability.

Generated by OpenCVE AI on May 1, 2026 at 05:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the OchaHouse theme to a version newer than 2.2.8, or apply the vendor's patch if available
  • Audit the WordPress installation for additional local file inclusion points and disable any PHP functions that allow dynamic include paths
  • If the theme is not essential, remove it or replace it with a secure alternative to eliminate the risk

Generated by OpenCVE AI on May 1, 2026 at 05:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 08 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes OchaHouse ochahouse allows PHP Local File Inclusion.This issue affects OchaHouse: from n/a through <= 2.2.8.
Title WordPress OchaHouse theme <= 2.2.8 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:10:57.339Z

Reserved: 2025-10-31T14:17:34.777Z

Link: CVE-2025-12550

cve-icon Vulnrichment

Updated: 2026-01-08T15:05:48.040Z

cve-icon NVD

Status : Deferred

Published: 2026-01-08T10:15:45.150

Modified: 2026-04-27T18:16:20.373

Link: CVE-2025-12550

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T06:00:13Z

Weaknesses