Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Cook&Meal cookandmeal allows PHP Local File Inclusion.This issue affects Cook&Meal: from n/a through <= 1.2.3.
Published: 2025-08-20
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability arises from improper control of filenames used in a PHP include/require statement in the dedalx Cook&Meal WordPress theme. An attacker can supply a crafted filename that the application will include, allowing arbitrary local files to be read or executed by the web server. The CVSS score of 8.1 reflects a high severity risk, indicating that successful exploitation could compromise confidentiality, integrity, and potentially availability of the affected WordPress site.

Affected Systems

The Cook&Meal theme from dedalx is vulnerable in all releases up to and including version 1.2.3. Sites that still host this theme without upgrading are exposed. This includes any WordPress installation using Cook&Meal, regardless of the size or demographic of the site.

Risk and Exploitability

The EPSS score of less than 1% suggests a low but non‑zero probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. According to the description, it is inferred that the attack vector requires an attacker to supply a filename parameter through a request to the theme’s PHP code; exploitation further depends on the presence of the target file within the web root or a known system directory. If the included file contains executable PHP, the impact expands to remote code execution. The CVE data does not reference any publicly known exploits, but the high CVSS score and potential for severe consequences warrant immediate attention.

Generated by OpenCVE AI on May 1, 2026 at 06:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Cook&Meal theme to a version newer than 1.2.3
  • Apply a whitelist-based approach in the theme’s file inclusion logic to allow only preapproved files, or remove the vulnerable include/require statements entirely
  • Disable the WordPress file editing feature and tighten directory permissions so the web server user cannot read or write arbitrary files under wp-content/themes/cookandmeal

Generated by OpenCVE AI on May 1, 2026 at 06:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28145 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Cook&Meal allows PHP Local File Inclusion. This issue affects Cook&Meal: from n/a through 1.2.3.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Cook&Meal allows PHP Local File Inclusion. This issue affects Cook&Meal: from n/a through 1.2.3. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Cook&Meal cookandmeal allows PHP Local File Inclusion.This issue affects Cook&Meal: from n/a through <= 1.2.3.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 21 Aug 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 20 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Cook&Meal allows PHP Local File Inclusion. This issue affects Cook&Meal: from n/a through 1.2.3.
Title WordPress Cook&Meal <= 1.2.3 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:52.575Z

Reserved: 2025-05-15T18:01:53.424Z

Link: CVE-2025-48149

cve-icon Vulnrichment

Updated: 2025-08-20T14:12:08.291Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T08:15:30.647

Modified: 2026-04-23T15:30:53.230

Link: CVE-2025-48149

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T06:45:11Z

Weaknesses