Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Kevon Adonis WP Abstracts wp-abstracts-manuscripts-manager allows PHP Local File Inclusion.This issue affects WP Abstracts: from n/a through <= 2.7.4.
Published: 2025-10-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WP Abstracts plugin contains an improper control of filename used in a PHP include/require statement, which is a Classic Example of CWE‑98’s Local File Inclusion. An attacker can supply arbitrary paths that the server will read and execute, potentially exposing sensitive files on the webroot or even executing injected PHP code. The vulnerability can lead to data disclosure or remote code execution if the included file contains executable code, compromising the entire WordPress site’s confidentiality, integrity, or availability.

Affected Systems

Any installation of the WP Abstracts plugin from the original release up to and including version 2.7.4 is affected. The plugin is developed and distributed by Kevon Adonis. The issue applies to all WordPress sites running the specified versions of the plugin, regardless of theme or other plugins.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity rating. The EPSS score of less than 1% suggests a very low likelihood of exploitation at this time, but it is not zero and can change as the vulnerability is discovered by attackers. The vulnerability is not listed in CISA KEV, meaning no known widespread exploitation yet. Based on the description, the attack vector is local file inclusion via a crafted web request that abuses the plugin’s filename handling. No privilege escalation or authentication requirement is explicitly mentioned, implying that an unauthenticated web user could exploit the flaw by manipulating request parameters that influence the include path.

Generated by OpenCVE AI on April 30, 2026 at 05:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Abstracts plugin to version 2.7.5 or later, processing any available security updates
  • If the upgrade is not immediately feasible, disable or remove the wp‑abstracts‑manuscripts‑manager plugin until a patched version is available
  • Apply proper file‑system permissions and restrict access to sensitive directories, and consider using .htaccess rules to block PHP execution in directories that should not contain executable files

Generated by OpenCVE AI on April 30, 2026 at 05:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 11:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Kevonadonis
Kevonadonis wp Abstracts
Wordpress
Wordpress wordpress
Vendors & Products Kevonadonis
Kevonadonis wp Abstracts
Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Kevon Adonis WP Abstracts wp-abstracts-manuscripts-manager allows PHP Local File Inclusion.This issue affects WP Abstracts: from n/a through <= 2.7.4.
Title WordPress WP Abstracts plugin <= 2.7.4 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Kevonadonis Wp Abstracts
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:56.712Z

Reserved: 2025-05-19T14:14:34.469Z

Link: CVE-2025-48338

cve-icon Vulnrichment

Updated: 2025-10-22T20:03:28.845Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T15:15:35.023

Modified: 2026-04-27T20:16:07.913

Link: CVE-2025-48338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T06:00:12Z

Weaknesses