Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Stallion stallion allows PHP Local File Inclusion.This issue affects Stallion: from n/a through <= 1.17.
Published: 2025-12-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability originates from improper validation of filenames in include/require calls within the Stallion theme, creating a file inclusion flaw (CWE‑98). An attacker could force the theme to include arbitrary files from the server’s file system, potentially leading to disclosure of sensitive data or execution of unintended code if the included file contains malicious payloads.

Affected Systems

The flaw exists in all releases of the Stallion theme up to and including version 1.17. The affected vendor is Axiom Themes, product Stallion. WordPress sites that have not already updated beyond v1.17 are vulnerable when the theme consumes user‑controlled input that is passed to its include logic.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score of less than 1% suggests that the probability of exploitation is currently very low. The vulnerability is not listed in CISA’s KEV catalog, implying it has not been widely observed in the wild yet. Based on the description, the likely attack vector is through local requests that allow inclusion of arbitrary files on the system, so the risk remains real for sites using older theme versions.

Generated by OpenCVE AI on April 29, 2026 at 13:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Stallion theme to version 1.18 or later, which removes the unchecked file inclusion logic.
  • Ensure that the WordPress file system permissions are configured so that the theme directory and included files cannot be read or executed by unauthorized users.
  • Deploy a web application firewall that blocks requests attempting directory traversal or including system files such as /etc/passwd.

Generated by OpenCVE AI on April 29, 2026 at 13:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 23 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes stallion
CPEs cpe:2.3:a:axiomthemes:stallion:*:*:*:*:*:wordpress:*:*
Vendors & Products Axiomthemes
Axiomthemes stallion

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Stallion stallion allows PHP Local File Inclusion.This issue affects Stallion: from n/a through <= 1.17.
Title WordPress Stallion theme <= 1.17 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Stallion
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:16:06.792Z

Reserved: 2025-09-06T04:44:31.842Z

Link: CVE-2025-58927

cve-icon Vulnrichment

Updated: 2025-12-18T18:51:15.754Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:16:00.007

Modified: 2026-01-20T15:17:10.943

Link: CVE-2025-58927

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:15:11Z

Weaknesses