Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Catwalk catwalk allows PHP Local File Inclusion.This issue affects Catwalk: from n/a through <= 1.4.
Published: 2025-12-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper control of filename used in a PHP include/require statement inside the Catwalk theme. Because the theme accepts a user‑supplied path and passes it directly to PHP, an attacker can cause the server to read arbitrary files, such as configuration, credentials, or possibly execute malicious code if the included file contains PHP. This weakness can result in disclosure of sensitive data or full compromise of the web application.

Affected Systems

The issue affects the axiomthemes Catwalk WordPress theme, versions from the earliest release through 1.4. Sites that have not upgraded past version 1.4 are vulnerable.

Risk and Exploitability

The CVSS base score of 8.1 indicates high severity. The EPSS score of less than 1% shows that exploitation is currently unlikely, but the vulnerability is not listed in the CISA KEV catalog, meaning no known widespread exploitation activity is reported. The likely attack vector is local file inclusion via crafted URL or form input that points to a file on the server; if the server allows execution of included PHP, the attacker can achieve remote code execution. Successful exploitation would compromise the confidentiality, integrity, and availability of the affected WordPress installation.

Generated by OpenCVE AI on April 29, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Catwalk theme to version 1.5 or later, which removes the insecure include logic.
  • If upgrading immediately is not possible, delete the file paths that allow arbitrary includes and restrict the include directory to a fixed location using absolute paths or PHP constants.
  • Implement input validation in the theme code to ensure that any paths passed to include/require are checked against a whitelist or sanitized to prevent traversal to unintended files.
  • Adjust server file permissions so that the web process cannot read sensitive files such as wp-config.php, and disable the PHP function allow_url_include if enabled.

Generated by OpenCVE AI on April 29, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 09 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes catwalk
CPEs cpe:2.3:a:axiomthemes:catwalk:*:*:*:*:*:wordpress:*:*
Vendors & Products Axiomthemes
Axiomthemes catwalk

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Catwalk catwalk allows PHP Local File Inclusion.This issue affects Catwalk: from n/a through <= 1.4.
Title WordPress Catwalk theme <= 1.4 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Catwalk
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:16:43.193Z

Reserved: 2025-06-30T10:46:21.828Z

Link: CVE-2025-53445

cve-icon Vulnrichment

Updated: 2025-12-18T19:10:42.162Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:15:54.887

Modified: 2026-01-20T15:16:57.630

Link: CVE-2025-53445

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:00:06Z

Weaknesses