Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creatives_Planet Leblix leblix allows PHP Local File Inclusion.This issue affects Leblix: from n/a through <= 2.4.
Published: 2025-11-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Creatives_Planet Leblix theme allows an attacker to influence the file path included by a PHP include/require statement. This improper control of filename flaw (CWE‑98) can enable local file inclusion, potentially giving an attacker read access to sensitive configuration or application files and possibly a pathway to execute arbitrary code if further exploited. The vulnerability is limited to the PHP code within the theme and does not grant arbitrary command execution directly. The impact is significant because compromised files may expose credentials, database connections, or other privileged data.

Affected Systems

WordPress installations that use the Leblix theme, version 2.4 or earlier, are affected. The issue is reported to impact all builds from the earliest release of the theme through 2.4. All WordPress sites hosting this theme without an updated version are therefore vulnerable.

Risk and Exploitability

The CVSS score for this vulnerability is 8.1, indicating a high severity that could result in data disclosure or system compromise. The EPSS score is reported as less than 1%, suggesting that current exploitation attempts are rare or unsuccessful; the vulnerability is also not listed in the CISA KEV catalog. Likely the exploitation path involves sending a crafted request that manipulates the theme’s inclusion logic—though the exact attack vector is not described in the advisory, it is inferred that a malicious user could cause the theme to include an attacker‑controlled file path and read sensitive content.

Generated by OpenCVE AI on April 29, 2026 at 23:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Leblix theme to a version newer than 2.4 or replace it with a secure, actively maintained alternative.
  • If an upgrade is not immediately possible, deactivate the Leblix theme and switch the site to a different theme to eliminate the vulnerable code.
  • Audit all template files for unsanitized include statements and add defensive checks that restrict file paths to a safe, predetermined directory.

Generated by OpenCVE AI on April 29, 2026 at 23:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 17 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Creatives Planet
Creatives Planet leblix
Wordpress
Wordpress wordpress
Vendors & Products Creatives Planet
Creatives Planet leblix
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creatives_Planet Leblix leblix allows PHP Local File Inclusion.This issue affects Leblix: from n/a through <= 2.4.
Title WordPress Leblix Theme <= 2.4 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References

Subscriptions

Creatives Planet Leblix
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:51.759Z

Reserved: 2025-09-06T04:45:29.150Z

Link: CVE-2025-58995

cve-icon Vulnrichment

Updated: 2025-11-17T16:02:50.733Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:00.987

Modified: 2026-04-27T20:16:23.590

Link: CVE-2025-58995

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:30:22Z

Weaknesses