Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nenad Obradovic Extensive VC Addons for WPBakery page builder extensive-vc-addon allows PHP Local File Inclusion.This issue affects Extensive VC Addons for WPBakery page builder: from n/a through <= 1.9.1.
Published: 2026-02-20
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is an improper control of the file name used in a PHP include or require statement in the WordPress plugin "Extensive VC Addons for WPBakery page builder". An attacker can supply a path that references files on the local server, causing the plugin to include and execute those files. If the attacker is able to place a malicious file on the server or reference an existing file that contains code, the result could be the execution of arbitrary code or the disclosure of sensitive information such as configuration files.

Affected Systems

Any WordPress site that has installed the plugin "Extensive VC Addons for WPBakery page builder" from its earliest release up through version 1.9.1 is affected. Sites that grant administrative or plugin‑installation privileges to users are therefore at risk, as the vulnerability relates to a core function of the plugin that may be invoked during normal site operation.

Risk and Exploitability

With a CVSS score of 8.1 the vulnerability is considered high severity. The EPSS score of less than 1% indicates that exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog. Because the flaw depends on influencing the file name argument in a local include, the attack vector is likely through any request that passes a filename to the plugin’s interface, possibly via authenticated or unauthenticated access. Successful exploitation could enable an attacker to read arbitrary files or execute code on the affected WordPress server.

Generated by OpenCVE AI on April 29, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest plugin version that resolves the improper file name validation (CWE-98).
  • If an update is unavailable, disable or uninstall the plugin until a fix is released.
  • Apply strict file system permissions and restrict the web server’s ability to read or write arbitrary files, mitigating the risk of local file inclusion (CWE‑98).

Generated by OpenCVE AI on April 29, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Nenad-obradovic
Nenad-obradovic extensive Vc Addons For Wpbakery Page Builder
Wordpress
Wordpress wordpress
Vendors & Products Nenad-obradovic
Nenad-obradovic extensive Vc Addons For Wpbakery Page Builder
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nenad Obradovic Extensive VC Addons for WPBakery page builder extensive-vc-addon allows PHP Local File Inclusion.This issue affects Extensive VC Addons for WPBakery page builder: from n/a through <= 1.9.1.
Title WordPress Extensive VC Addons for WPBakery page builder plugin <= 1.9.1 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Nenad-obradovic Extensive Vc Addons For Wpbakery Page Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:37:31.618Z

Reserved: 2025-09-25T15:20:02.782Z

Link: CVE-2025-60087

cve-icon Vulnrichment

Updated: 2026-02-24T20:35:18.740Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:02.367

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-60087

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T17:30:16Z

Weaknesses