Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Amuli amuli allows PHP Local File Inclusion.This issue affects Amuli: from n/a through <= 2.3.0.
Published: 2026-01-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Amuli theme for WordPress includes a flaw in the file–include logic that allows an attacker to supply an arbitrary local file path to the PHP include statement. The vulnerability is identified as CWE‑98 and can be exploited to read sensitive files or execute attacker‑controlled PHP code if such code is present in the chosen file. The primary security impact is local file inclusion, with the potential to evolve into remote code execution if the attacker manages to include a malicious PHP file.

Affected Systems

All versions of the AxiomThemes Amuli WordPress theme that are version 2.3.0 or earlier are affected. Users who have upgraded to any release beyond 2.3.0 no longer face this risk.

Risk and Exploitability

The CVSS base score of 8.1 indicates high severity, while the EPSS score of <1% suggests a low probability of active exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is a crafted URL or form input that manipulates the file path used by the theme’s include statement; this inference is based on the nature of the flaw and the lack of explicit information in the description. No authentication or administrative privileges are required, and exploitation conditions are minimal: the site must be running a vulnerable theme and the input used to build the file path must be controllable by an external actor.

Generated by OpenCVE AI on April 30, 2026 at 14:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Amuli theme to version 2.3.1 or later, which removes the vulnerable include logic.
  • If an immediate upgrade is not feasible, limit file system permissions or employ a .htaccess rule to deny access to PHP files outside the theme directory, thereby preventing unauthorized inclusion.
  • Disable WordPress file editing from the dashboard by setting DISALLOW_FILE_EDIT to true in wp-config.php to reduce the risk of an attacker uploading malicious files that could be included by the theme.

Generated by OpenCVE AI on April 30, 2026 at 14:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 26 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes amuli
Wordpress
Wordpress wordpress
Vendors & Products Axiomthemes
Axiomthemes amuli
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Amuli amuli allows PHP Local File Inclusion.This issue affects Amuli: from n/a through <= 2.3.0.
Title WordPress Amuli theme <= 2.3.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Amuli
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:15.818Z

Reserved: 2025-06-11T16:08:03.196Z

Link: CVE-2025-50003

cve-icon Vulnrichment

Updated: 2026-01-26T21:59:13.150Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:15:56.770

Modified: 2026-04-27T16:16:27.580

Link: CVE-2025-50003

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:15:40Z

Weaknesses