Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in zozothemes Corpkit corpkit allows PHP Local File Inclusion.This issue affects Corpkit: from n/a through <= 2.0.
Published: 2026-01-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Zozothemes Corpkit theme contains an improper control of filename for include/require statements, allowing a local file inclusion (LFI) attack. An attacker can manipulate user input to reference arbitrary files on the server and read their contents. If the included file contains PHP code, the attacker may achieve remote code execution or elevate privileges, compromising confidentiality, integrity, and availability of the WordPress site.

Affected Systems

The vulnerability affects the Corpkit theme distributed by Zozothemes, specifically all releases from the earliest available version through version 2.0. Any site running these theme versions without the fix is potentially exposed.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity. The EPSS score of less than 1% suggests that at the moment the likelihood of exploitation is very low, and it is not listed in the CISA KEV catalog. The attack vector is most likely via a crafted URL or form that feeds a file path parameter to the theme’s include logic. The exploitation requires the attacker to send a request to the vulnerable site with a manipulated filename; no privileged user access is required, so the impact could affect any visitor with a valid session or even unauthenticated users, depending on the site’s configuration.

Generated by OpenCVE AI on April 29, 2026 at 17:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Corpkit theme to a version newer than 2.0 when available
  • If an upgrade is not immediately possible, disable the theme or migrate to a secure alternative
  • Validate and sanitize all file path inputs in the theme’s code to prevent arbitrary file access
  • Configure the web server to block access to sensitive directories such as /wp-includes and /wp-admin from external requests

Generated by OpenCVE AI on April 29, 2026 at 17:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 03 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 08 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in zozothemes Corpkit corpkit allows PHP Local File Inclusion.This issue affects Corpkit: from n/a through <= 2.0.
Title WordPress Corpkit theme <= 2.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:23.786Z

Reserved: 2025-12-15T09:59:49.436Z

Link: CVE-2025-67925

cve-icon Vulnrichment

Updated: 2026-01-08T18:47:07.866Z

cve-icon NVD

Status : Deferred

Published: 2026-01-08T10:15:51.483

Modified: 2026-04-27T18:16:49.603

Link: CVE-2025-67925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T17:45:16Z

Weaknesses