Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in John Darrel Hide My WP Ghost hide-my-wp allows PHP Local File Inclusion.This issue affects Hide My WP Ghost: from n/a through <= 5.4.01.
Published: 2025-03-27
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Local File Inclusion flaw in the Hide My WP Ghost plugin for WordPress allows an attacker to read arbitrary files on the server and subsequently execute PHP code, leading to full control of the affected web environment. The vulnerability is a classic CWE‑98 issue involving improper validation of filenames used in PHP include or require statements. If successfully exploited, confidential data could be disclosed, the server could be compromised, and the website’s integrity and availability would be threatened.

Affected Systems

The issue impacts the WordPress plugin Hide My WP Ghost developed by John Darrel, affecting all releases from the initial version up through 5.4.01. WordPress sites running any of these versions are vulnerable.

Risk and Exploitability

The CVSS score of 9.6 indicates a critical threat, but the EPSS score of less than 1% suggests the likelihood of widespread exploitation remains low at present. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires that the attacker is able to influence the include path parameter, which typically occurs via crafted requests that manipulate user input or via local privilege escalation. Once the file is included, arbitrary PHP execution can be achieved, making the vulnerability essentially a remote code execution vector.

Generated by OpenCVE AI on May 1, 2026 at 12:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Hide My WP Ghost to version 5.4.02 or later, applying the vendor‑supplied security fix.
  • If the plugin is not essential, disable or remove it from the WordPress installation.
  • Configure the web server to restrict file permissions so that only necessary files are readable by the PHP process, limiting the impact of any potential LFI attempt.
  • Deploy a web application firewall or similar intrusion prevention system to detect and block suspicious file inclusion requests.

Generated by OpenCVE AI on May 1, 2026 at 12:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14845 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in John Darrel Hide My WP Ghost allows PHP Local File Inclusion.This issue affects Hide My WP Ghost: from n/a through 5.4.01.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in John Darrel Hide My WP Ghost allows PHP Local File Inclusion.This issue affects Hide My WP Ghost: from n/a through 5.4.01. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in John Darrel Hide My WP Ghost hide-my-wp allows PHP Local File Inclusion.This issue affects Hide My WP Ghost: from n/a through <= 5.4.01.
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpplugins
Wpplugins hide My Wp Ghost
CPEs cpe:2.3:a:wpplugins:hide_my_wp_ghost:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpplugins
Wpplugins hide My Wp Ghost

Thu, 27 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in John Darrel Hide My WP Ghost allows PHP Local File Inclusion.This issue affects Hide My WP Ghost: from n/a through 5.4.01.
Title WordPress Hide My WP Ghost plugin <= 5.4.01 - Local File Inclusion to RCE vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Wpplugins Hide My Wp Ghost
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:43.806Z

Reserved: 2025-02-17T11:50:52.141Z

Link: CVE-2025-26909

cve-icon Vulnrichment

Updated: 2025-03-27T16:16:56.252Z

cve-icon NVD

Status : Modified

Published: 2025-03-27T16:15:30.400

Modified: 2026-04-23T15:26:02.540

Link: CVE-2025-26909

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T12:45:15Z

Weaknesses