Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Tacticool tacticool allows PHP Local File Inclusion.This issue affects Tacticool: from n/a through <= 1.0.13.
Published: 2025-12-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper control of the filename used in a PHP include/require statement allows a local file to be read, leading to potential execution of arbitrary server‑side code. This vulnerability is classified as CWE‑98 and can expose sensitive data or compromise the entire WordPress installation. Attackers who can manipulate the path can gain read access to local files and may execute crafted scripts, resulting in a loss of confidentiality, integrity, and availability of the site.

Affected Systems

Affected is the WordPress Tacticool theme distributed by AxiomThemes. Any installation using version 1.0.13 or earlier is vulnerable. The vulnerability applies to all WordPress sites that have this theme active, regardless of other plugins or themes.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score of less than 1% suggests a very low probability of exploitation at the time of publication. The vulnerability is not listed in CISA's KEV catalog. Based on the description, the likely attack vector is through a crafted URL or form input that the theme processes. Once invoked, the LFI can lead to remote code execution in the context of the web server.

Generated by OpenCVE AI on April 30, 2026 at 14:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tacticool theme to version 1.0.14 or later, which includes a fix for the LFI vulnerability.
  • If the latest version is not available, remove or deactivate the Tacticool theme from the WordPress installation to prevent the vulnerable code from executing.
  • Restrict read permissions for critical files such as wp-config.php and other sensitive directories by setting appropriate file permissions or using .htaccess/Apache directives to block external read access.

Generated by OpenCVE AI on April 30, 2026 at 14:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 05 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes tacticool
CPEs cpe:2.3:a:axiomthemes:tacticool:*:*:*:*:*:wordpress:*:*
Vendors & Products Axiomthemes
Axiomthemes tacticool

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Tacticool tacticool allows PHP Local File Inclusion.This issue affects Tacticool: from n/a through <= 1.0.13.
Title WordPress Tacticool theme <= 1.0.13 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Tacticool
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:49.983Z

Reserved: 2025-09-06T04:44:48.015Z

Link: CVE-2025-58937

cve-icon Vulnrichment

Updated: 2025-12-18T17:57:08.348Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:16:01.323

Modified: 2026-04-27T20:16:20.633

Link: CVE-2025-58937

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:30:06Z

Weaknesses