Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza ruza allows PHP Local File Inclusion.This issue affects Ruza: from n/a through <= 1.0.7.
Published: 2025-06-17
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Ruza theme for WordPress contains an improper control of filenames used in PHP include/require statements, which allows an attacker to trigger local file inclusion. This flaw can enable the reading of arbitrary files within the web server’s file system, potentially exposing configuration files, credentials, or private data, and may also allow execution of attacker-supplied PHP code if the included file contains executable code.

Affected Systems

The vulnerability affects the WordPress Ruza theme from version 1.0.7 and earlier, released by thembay. Any WordPress installation using Ruza 1.0.7 or older is susceptible.

Risk and Exploitability

The CVSS score of 8.1 reflects high severity, while the EPSS score of less than 1% indicates a low probability of exploitation at present. The flaw is not listed in the CISA KEV catalog. Exploitation requires an attacker to influence the value passed to the include/require call, which can be achieved through user-controlled input such as a query parameter or a theme-specific setting. Successful exploitation would allow local file reads and potentially PHP code execution if the attacker can supply a PHP file.

Generated by OpenCVE AI on April 30, 2026 at 11:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Ruza theme to the latest available version that removes the LFI vulnerability.
  • If an update is unavailable, switch to an alternative WordPress theme that does not contain this flaw.
  • As a temporary mitigation, restrict the include path by configuring the server to deny access to critical files and directories, and ensure that the theme’s code validates filenames before including them.

Generated by OpenCVE AI on April 30, 2026 at 11:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28287 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza allows PHP Local File Inclusion. This issue affects Ruza: from n/a through 1.0.7.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza allows PHP Local File Inclusion. This issue affects Ruza: from n/a through 1.0.7. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza ruza allows PHP Local File Inclusion.This issue affects Ruza: from n/a through <= 1.0.7.
Title WordPress Ruza <= 1.0.7 - Local File Inclusion Vulnerability WordPress Ruza theme <= 1.0.7 - Local File Inclusion Vulnerability
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 18 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza allows PHP Local File Inclusion. This issue affects Ruza: from n/a through 1.0.7.
Title WordPress Ruza <= 1.0.7 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-12T00:23:58.699Z

Reserved: 2025-06-04T09:41:14.294Z

Link: CVE-2025-49255

cve-icon Vulnrichment

Updated: 2025-06-18T15:01:20.238Z

cve-icon NVD

Status : Deferred

Published: 2025-06-17T15:15:47.127

Modified: 2026-04-23T15:31:20.030

Link: CVE-2025-49255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T11:30:06Z

Weaknesses