Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Diza diza allows PHP Local File Inclusion.This issue affects Diza: from n/a through <= 1.3.8.
Published: 2025-06-17
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Diza WordPress theme contains an improper controlled filename for include/require, which allows a local file inclusion (LFI) flaw. This vulnerability enables an attacker to include arbitrary files from the server’s filesystem, potentially exposing sensitive configuration files or executing malicious code. The impact is severe; successful exploitation can compromise confidentiality and integrity of the hosted WordPress site.

Affected Systems

This weakness exists in the Diza theme distributed by thembay, affecting all releases starting from the first noted version through 1.3.8. Any WordPress installation that has this theme installed and has not been updated beyond 1.3.8 is vulnerable.

Risk and Exploitability

The CVSS score of 8.1 classifies the issue as high severity, but the EPSS score of less than 1% shows a currently low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through normal web traffic to the site, where an attacker can craft a request to the theme’s inclusion endpoint to specify a local file. No additional authentication or privilege escalation is required, making the risk accessible to unauthenticated users who can send crafted URLs.

Generated by OpenCVE AI on April 30, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Diza theme to a version newer than 1.3.8, preferably the latest available release.
  • Apply input validation to the filename used in PHP include or require calls, restricting it to allowed directories and preventing user‑controlled paths.
  • Disable or replace the vulnerable theme functionality if an immediate patch is not available, such as switching to a non‑vulnerable theme or removing the file‑inclusion feature from the site's code.

Generated by OpenCVE AI on April 30, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28291 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Diza allows PHP Local File Inclusion. This issue affects Diza: from n/a through 1.3.8.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Diza allows PHP Local File Inclusion. This issue affects Diza: from n/a through 1.3.8. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Diza diza allows PHP Local File Inclusion.This issue affects Diza: from n/a through <= 1.3.8.
Title WordPress Diza <= 1.3.8 - Local File Inclusion Vulnerability WordPress Diza theme <= 1.3.8 - Local File Inclusion Vulnerability
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 18 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Diza allows PHP Local File Inclusion. This issue affects Diza: from n/a through 1.3.8.
Title WordPress Diza <= 1.3.8 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:59.497Z

Reserved: 2025-06-04T09:41:14.294Z

Link: CVE-2025-49261

cve-icon Vulnrichment

Updated: 2025-06-18T16:14:50.265Z

cve-icon NVD

Status : Deferred

Published: 2025-06-17T15:15:48.033

Modified: 2026-04-23T15:31:20.720

Link: CVE-2025-49261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T11:30:06Z

Weaknesses