Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Palatio palatio allows PHP Local File Inclusion.This issue affects Palatio: from n/a through <= 1.6.
Published: 2025-12-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Palatio theme for WordPress incorporates an include/require statement that improperly validates the file name supplied by a user, enabling a local file inclusion (LFI) vulnerability classified as CWE‑98. This flaw can let an attacker read arbitrary files on the server or include malicious code, potentially compromising the confidentiality, integrity, or availability of the hosting environment.

Affected Systems

AxiomThemes Palatio theme version 1.6 and earlier for WordPress installations are affected. Any WordPress site using the Palatio theme at or below version 1.6 is vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 8.1, indicating high severity, while the EPSS score is below 1 %, suggesting a low but non‑zero likelihood of exploitation. It is not listed in CISA’s KEV catalogue. Exploitation would likely involve crafting a request that manipulates the include path exposed by the theme, potentially originating from unauthenticated or authenticated contexts. If the file inclusion is accessible without further privileges, an attacker can read sensitive files; if it permits code execution, the attacker could gain full control of the site.

Generated by OpenCVE AI on April 29, 2026 at 22:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Palatio theme to the latest available version that contains the LFI fix or a later release beyond 1.6.
  • If an immediate upgrade is not feasible, temporarily switch the WordPress installation to a secure default theme that does not use the vulnerable include logic.
  • Apply server‑side input validation or restrict the include directory by confirming the file path against an allow‑list and ensure PHP’s allow_url_include is disabled.

Generated by OpenCVE AI on April 29, 2026 at 22:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 23 Dec 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes palatio
CPEs cpe:2.3:a:axiomthemes:palatio:*:*:*:*:*:wordpress:*:*
Vendors & Products Axiomthemes
Axiomthemes palatio

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Palatio palatio allows PHP Local File Inclusion.This issue affects Palatio: from n/a through <= 1.6.
Title WordPress Palatio theme <= 1.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Palatio
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:50.124Z

Reserved: 2025-09-06T04:44:31.842Z

Link: CVE-2025-58931

cve-icon Vulnrichment

Updated: 2025-12-18T16:58:22.663Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:16:00.533

Modified: 2026-04-27T20:16:19.850

Link: CVE-2025-58931

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T22:45:06Z

Weaknesses