Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Edge-Themes Edge CPT edge-cpt allows PHP Local File Inclusion.This issue affects Edge CPT: from n/a through <= 1.4.
Published: 2025-08-20
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Edge-Themes Edge CPT plugin allows an attacker to control the filename passed to a PHP include/require statement, enabling Local File Inclusion. If an attacker can supply a malicious path, the server may read or execute arbitrary local files, which could result in disclosure of sensitive data or remote code execution. This flaw is classified as CWE-98.

Affected Systems

WordPress installations running Edge CPT plugin version 1.4 or earlier are vulnerable. The affected product is the Edge CPT plugin by Edge-Themes, applicable to all WordPress sites that have not upgraded past version 1.4.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity, yet the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Attackers could exploit the flaw by manipulating the file path parameter used by the plugin, typically through a crafted URL or form input. No special privileges are required beyond the ability to trigger the plugin’s include logic, so the attack vector is likely remote, delivered through the web interface.

Generated by OpenCVE AI on April 30, 2026 at 08:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Edge CPT plugin to a patched release as soon as one is available.
  • If an update is not yet available, disable or uninstall the plugin to eliminate the vulnerable include logic.
  • Configure the web application firewall or PHP settings to block arbitrary file includes, such as disabling allow_url_include and applying open_basedir restrictions.

Generated by OpenCVE AI on April 30, 2026 at 08:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25357 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imaprogrammer Custom Comment allows Stored XSS. This issue affects Custom Comment: from n/a through 2.1.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imaprogrammer Custom Comment allows Stored XSS. This issue affects Custom Comment: from n/a through 2.1.6. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Edge-Themes Edge CPT edge-cpt allows PHP Local File Inclusion.This issue affects Edge CPT: from n/a through <= 1.4.
Title WordPress Custom Comment plugin <= 2.1.6 - Cross Site Scripting (XSS) vulnerability WordPress Edge CPT plugin <= 1.4 - Local File Inclusion vulnerability
Weaknesses CWE-79 CWE-98
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Thu, 21 Aug 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 20 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imaprogrammer Custom Comment allows Stored XSS. This issue affects Custom Comment: from n/a through 2.1.6.
Title WordPress Custom Comment plugin <= 2.1.6 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:07.124Z

Reserved: 2025-06-11T16:06:23.852Z

Link: CVE-2025-49889

cve-icon Vulnrichment

Updated: 2025-08-20T17:54:42.371Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T08:15:38.137

Modified: 2026-04-23T15:31:47.423

Link: CVE-2025-49889

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:30:06Z

Weaknesses