Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Majestic Support Majestic Support majestic-support allows PHP Local File Inclusion.This issue affects Majestic Support: from n/a through <= 1.0.6.
Published: 2025-02-25
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is an improper control of filenames in include/require statements within the Majestic Support WordPress plugin, allowing an attacker to supply a controlled path. This Local File Inclusion can expose confidential site files and, if the attacker can manipulate the include to execute code, lead to remote code execution. The weakness is classified as CWE-98. The impact is limited to the application scope but can be escalated to full system compromise if file execution is possible.

Affected Systems

The issue affects the Majestic Support plugin for WordPress versions up through 1.0.6, including the package name Majestic Support: Majestic Support. No specific Windows or OS distribution is tied to the vulnerability; it operates within any WordPress installation that hosts affected plugin versions.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity. The EPSS score of less than 1% suggests a low probability of immediate exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through the plugin’s interface or crafted URLs that exploit the vulnerable include, requiring no elevated privileges on the web server beyond those granted to the web application.

Generated by OpenCVE AI on May 1, 2026 at 15:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Majestic Support plugin to version 1.0.7 or newer.
  • If the plugin is not needed, completely disable or uninstall it from the WordPress site.
  • Restrict file system permissions for the plugin directory and enforce strict path validation for any file include operations.

Generated by OpenCVE AI on May 1, 2026 at 15:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5373 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Majestic Support Majestic Support allows PHP Local File Inclusion. This issue affects Majestic Support: from n/a through 1.0.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Majestic Support Majestic Support allows PHP Local File Inclusion. This issue affects Majestic Support: from n/a through 1.0.6. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Majestic Support Majestic Support majestic-support allows PHP Local File Inclusion.This issue affects Majestic Support: from n/a through <= 1.0.6.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 25 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 14:30:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Majestic Support Majestic Support allows PHP Local File Inclusion. This issue affects Majestic Support: from n/a through 1.0.6.
Title WordPress Majestic Support plugin <= 1.0.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:45.810Z

Reserved: 2025-02-17T11:51:47.719Z

Link: CVE-2025-26985

cve-icon Vulnrichment

Updated: 2025-02-25T19:35:14.085Z

cve-icon NVD

Status : Deferred

Published: 2025-02-25T15:15:31.183

Modified: 2026-04-23T15:26:11.487

Link: CVE-2025-26985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T15:45:16Z

Weaknesses