Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx InHype - Blog & Magazine WordPress Theme inhype allows PHP Local File Inclusion.This issue affects InHype - Blog & Magazine WordPress Theme: from n/a through <= 1.5.2.
Published: 2025-11-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability, classified as CWE-98, arises from the InHype WordPress theme allowing a local file to be included via a PHP include/require statement that is not properly controlled. An attacker who can influence the filename parameter may cause the application to read arbitrary files from the server or, in some configurations, execute code. The consequence is potential disclosure of sensitive information or execution of arbitrary PHP code, compromising confidentiality, integrity, and availability of the site.

Affected Systems

The affected product is the InHype - Blog & Magazine WordPress Theme developed by dedalx, versions from the initial release through 1.5.2 inclusive. WordPress sites that have installed or activated these versions of the theme are vulnerable.

Risk and Exploitability

The CVSS base score of 8.1 indicates high severity. The EPSS score of less than 1% suggests a low probability of exploitation in the wild at present, and the vulnerability is not recorded in the CISA KEV catalog. Likely attack path involves an unauthenticated or authenticated user submitting a crafted request that triggers the uncontrolled include operation in the theme. Successful exploitation could lead to reading sensitive files or executing PHP code.

Generated by OpenCVE AI on April 29, 2026 at 23:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the InHype theme to a version beyond 1.5.2 where the inclusion issue is fixed.
  • If an upgrade is not feasible, remove or disable any theme functionality that relies on the vulnerable include/require call, and ensure the affected files are not exposed to the web root.
  • Implement strict input validation for any file path parameters and enforce a whitelist of allowed directories so that the PHP include/require statements cannot reference arbitrary files.

Generated by OpenCVE AI on April 29, 2026 at 23:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Dedalx
Dedalx inhype
Wordpress
Wordpress wordpress
Vendors & Products Dedalx
Dedalx inhype
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx InHype - Blog & Magazine WordPress Theme inhype allows PHP Local File Inclusion.This issue affects InHype - Blog & Magazine WordPress Theme: from n/a through <= 1.5.2.
Title WordPress InHype - Blog & Magazine WordPress Theme theme <= 1.5.2 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Dedalx Inhype
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:57.557Z

Reserved: 2025-09-25T15:28:42.279Z

Link: CVE-2025-60199

cve-icon Vulnrichment

Updated: 2025-11-06T17:44:05.329Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:05.267

Modified: 2026-04-27T16:16:32.980

Link: CVE-2025-60199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:15:23Z

Weaknesses