Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Plan My Day planmyday allows PHP Local File Inclusion.This issue affects Plan My Day: from n/a through <= 1.1.13.
Published: 2025-12-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Plan My Day WordPress theme is an improper control of the filename used in an include/require statement. By supplying a crafted input, an attacker can cause the theme to include an arbitrary local file. This can lead to reading sensitive files, or if the file contains PHP code, to executing attacker‑controlled instructions, thereby compromising the integrity and confidentiality of the site.

Affected Systems

Axiomthemes’ Plan My Day WordPress theme is affected for all releases up to and including version 1.1.13. The issue occurs in any installation of the theme on WordPress.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and the flaw is not listed in the CISA KEV catalog. The most likely attack vector is via a crafted HTTP request that manipulates the theme’s filename parameter; the exploit does not require authentication as the theme code executes on every page load. Successful exploitation can expose local files or allow remote code execution if the attacker can supply PHP code.

Generated by OpenCVE AI on April 29, 2026 at 15:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Plan My Day theme to a version beyond 1.1.13 where the file‑inclusion flaw is resolved.
  • If an immediate update is not feasible, remove or temporarily disable the theme until the patched version is installed.
  • Verify that all file‑include calls in the theme use hard‑coded, validated paths or have been rewritten to avoid user‑controlled input; if custom code was added, audit it for similar weaknesses.

Generated by OpenCVE AI on April 29, 2026 at 15:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 06 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes plan My Day
CPEs cpe:2.3:a:axiomthemes:plan_my_day:*:*:*:*:*:wordpress:*:*
Vendors & Products Axiomthemes
Axiomthemes plan My Day

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Plan My Day planmyday allows PHP Local File Inclusion.This issue affects Plan My Day: from n/a through <= 1.1.13.
Title WordPress Plan My Day theme <= 1.1.13 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Plan My Day
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:15:21.899Z

Reserved: 2025-06-30T10:46:13.038Z

Link: CVE-2025-53435

cve-icon Vulnrichment

Updated: 2025-12-18T19:22:06.391Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:15:53.853

Modified: 2026-01-20T15:16:56.263

Link: CVE-2025-53435

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:00:06Z

Weaknesses