Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Greeny greeny allows PHP Local File Inclusion.This issue affects Greeny: from n/a through <= 2.6.
Published: 2025-12-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from improper control of the filename used in an include/require statement in PHP, classified as CWE‑98. It permits a Local File Inclusion (LFI) that can allow an attacker to read arbitrary files or execute code within the WordPress installation, thereby compromising confidentiality, integrity, or availability. The high CVSS score of 8.1 reflects the potential severity of a successful exploitation.

Affected Systems

The Greeny theme from AxiomThemes, in any version 2.6 or earlier, is affected. Deployments of this theme on WordPress installations fall under the scope of the vulnerability.

Risk and Exploitability

The EPSS score is less than 1 %, indicating a very low present exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. However, the likely attack vector is a publicly accessible URL parameter that the theme passes to an include path; an attacker who can control that parameter could supply a local file path, potentially leading to remote code execution. The high CVSS highlights the severe impact if the vulnerability is exploited, and security teams should prioritize mitigating this risk.

Generated by OpenCVE AI on April 29, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Greeny theme to a version newer than 2.6 if an update is available, as the vulnerability is limited to older releases.
  • Restrict the include/require paths used by the theme to a known safe directory and validate any filename inputs against a whitelist to prevent path traversal or arbitrary file references.
  • Disable execution of arbitrary files in PHP (e.g., by configuring open_basedir or using PHP’s disable_functions) or configure WordPress to prevent theme code from accessing sensitive system files.

Generated by OpenCVE AI on April 29, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 06 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes greeny
CPEs cpe:2.3:a:axiomthemes:greeny:*:*:*:*:*:wordpress:*:*
Vendors & Products Axiomthemes
Axiomthemes greeny

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Greeny greeny allows PHP Local File Inclusion.This issue affects Greeny: from n/a through <= 2.6.
Title WordPress Greeny theme <= 2.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Greeny
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:16:12.195Z

Reserved: 2025-06-30T10:46:21.828Z

Link: CVE-2025-53441

cve-icon Vulnrichment

Updated: 2025-12-18T19:10:50.912Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:15:54.507

Modified: 2026-01-20T15:16:57.200

Link: CVE-2025-53441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:00:06Z

Weaknesses