Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in bslthemes Kinsley kinsley allows PHP Local File Inclusion.This issue affects Kinsley: from n/a through <= 3.4.4.
Published: 2025-11-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability stems from improper validation of filenames in PHP include/require statements within the Kinsley theme, leading to a Local File Inclusion flaw (CWE-98). An attacker who can influence the file path may read sensitive server files or include malicious content, potentially resulting in privilege escalation or remote code execution, depending on the server configuration and file permissions. The impact thus encompasses confidentiality, integrity, and availability risks for the affected WordPress installation.

Affected Systems

The affected product is the Kinsley theme by bslthemes, versions up to and including 3.4.4 are susceptible. No specific sub‑versions are listed, so all releases prior to 3.4.5 must be considered vulnerable until a patch is applied.

Risk and Exploitability

The severity of the issue is reflected in a CVSS score of 8.1, indicating a high‑risk condition. The EPSS score of less than 1% indicates a low likelihood of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is via the theme's include functionality, inferred from the PHP code that accepts external path inputs without adequate sanitization. Successful exploitation would require the attacker to supply a crafted file path, which is feasible if the theme exposes an endpoint or form that influences the include parameter.

Generated by OpenCVE AI on April 30, 2026 at 05:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Kinsley theme to the latest version that removes the LFI vulnerability.
  • If an immediate update is not feasible, restrict file system access for the WordPress installation by setting appropriate permissions and removing unnecessary include paths from the theme code.
  • Implement strict input validation and sanitization for any user‑supplied file paths used in include or require statements to prevent malicious path traversal.

Generated by OpenCVE AI on April 30, 2026 at 05:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Bslthemes
Bslthemes kinsley
Wordpress
Wordpress wordpress
Vendors & Products Bslthemes
Bslthemes kinsley
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in bslthemes Kinsley kinsley allows PHP Local File Inclusion.This issue affects Kinsley: from n/a through <= 3.4.4.
Title WordPress Kinsley theme <= 3.4.4 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Bslthemes Kinsley
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:55.297Z

Reserved: 2025-05-19T14:13:30.917Z

Link: CVE-2025-48290

cve-icon Vulnrichment

Updated: 2025-11-10T19:37:07.763Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:15:52.627

Modified: 2026-04-27T20:16:07.640

Link: CVE-2025-48290

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:30:06Z

Weaknesses