Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Medizin medizin allows PHP Local File Inclusion.This issue affects Medizin: from n/a through < 1.9.7.
Published: 2025-10-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Medizin WordPress theme contains a flaw where user‑controlled input is used unchecked in a PHP include/require statement, allowing a local file to be read or executed. This can lead to execution of arbitrary PHP code or disclosure of sensitive files stored on the web server. The primary risk is that an attacker may gain the ability to run malicious scripts or access configuration files, thereby compromising the confidentiality, integrity, or availability of the site.

Affected Systems

ThemeMove’s Medizin theme for WordPress is vulnerable in all versions prior to 1.9.7. The flaw affects installations where the theme is active, regardless of WordPress core version or other plugins. The CPA list identifies the theme on any WordPress deployment.

Risk and Exploitability

With a CVSS score of 8.1 the vulnerability is classified as high severity, and its EPSS score of less than 1% implies a very low current exploitation probability. However, the issue is not listed in CISA’s KEV catalog, meaning there is no indication of broad exploitation yet. The likely attack vector is a crafted request to the site that passes a file path to the vulnerable include, assuming the attacker can influence the input. If successful, the attacker could execute arbitrary code or read files, potentially leading to full site compromise.

Generated by OpenCVE AI on April 29, 2026 at 14:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Medizin theme to version 1.9.7 or later
  • Modify wp-config.php to set DISALLOW_FILE_EDIT to true, preventing file edits from the dashboard
  • Configure the theme’s file inclusion logic to use a strict whitelist of permitted files and validate paths before including
  • Sanitize all user‑supplied arguments used in include/require statements to remove directory traversal or null byte characters
  • Re‑evaluate all active themes and plugins, removing any untrusted or outdated ones, and ensure file permissions on theme directories are set to the minimum necessary

Generated by OpenCVE AI on April 29, 2026 at 14:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Thememove
Thememove medizin
CPEs cpe:2.3:a:thememove:medizin:*:*:*:*:*:wordpress:*:*
Vendors & Products Thememove
Thememove medizin

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Medizin medizin allows PHP Local File Inclusion.This issue affects Medizin: from n/a through < 1.9.7.
Title WordPress Medizin Theme < 1.9.7 - Local File Inclusion Vulnerability
Weaknesses CWE-98
References

Subscriptions

Thememove Medizin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:19:42.140Z

Reserved: 2025-09-17T18:00:39.586Z

Link: CVE-2025-59555

cve-icon Vulnrichment

Updated: 2025-10-23T16:07:37.887Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-22T15:15:53.977

Modified: 2026-01-29T14:39:44.713

Link: CVE-2025-59555

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T14:30:13Z

Weaknesses