Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in real-web RealtyElite realtyelite allows PHP Local File Inclusion.This issue affects RealtyElite: from n/a through <= 1.0.0.
Published: 2025-06-27
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An improperly controlled filename used in a PHP include/require statement allows local file inclusion in the WordPress RealtyElite theme. The flaw can enable an attacker to read arbitrary files on the server, and if the payload is executed it can lead to code execution. This is a CWE-98 flaw that directly compromises file confidentiality and integrity and can ultimately threaten system availability.

Affected Systems

The vulnerability affects the Real-web RealtyElite WordPress theme versions from the initial release up to and including 1.0.0. WordPress sites that use any of these affected theme versions are at risk.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity. The EPSS score is below 1%, suggesting that widespread exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a local file inclusion triggered by an untrusted parameter that the theme passes to an include/require function, potentially via a crafted URL or form input. An attacker could read sensitive files or, if the file read is executable, could possibly execute arbitrary code.

Generated by OpenCVE AI on April 30, 2026 at 10:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade RealtyElite to a version newer than 1.0.0 that incorporates the fix.
  • Disable PHP's allow_url_include directive and enable open_basedir restrictions to limit file inclusion to the theme directory.
  • Deploy a Web Application Firewall or modify your web server rules to block requests that attempt directory traversal or arbitrary file access patterns.

Generated by OpenCVE AI on April 30, 2026 at 10:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19303 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in real-web RealtyElite allows PHP Local File Inclusion. This issue affects RealtyElite: from n/a through 1.0.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in real-web RealtyElite allows PHP Local File Inclusion. This issue affects RealtyElite: from n/a through 1.0.0. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in real-web RealtyElite realtyelite allows PHP Local File Inclusion.This issue affects RealtyElite: from n/a through <= 1.0.0.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Jun 2025 12:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in real-web RealtyElite allows PHP Local File Inclusion. This issue affects RealtyElite: from n/a through 1.0.0.
Title WordPress RealtyElite theme <= 1.0.0 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:19.412Z

Reserved: 2025-06-19T10:03:36.790Z

Link: CVE-2025-52808

cve-icon Vulnrichment

Updated: 2025-06-27T13:10:24.510Z

cve-icon NVD

Status : Deferred

Published: 2025-06-27T12:15:42.293

Modified: 2026-04-23T15:32:12.753

Link: CVE-2025-52808

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T10:45:26Z

Weaknesses