Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Powerlift powerlift allows PHP Local File Inclusion.This issue affects Powerlift: from n/a through < 3.2.1.
Published: 2026-01-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion that can lead to Remote Code Execution
Action: Patch Now
AI Analysis

Impact

This vulnerability originates from improper handling of filename parameters in PHP include statements, allowing an attacker to force the Powerlift theme to include arbitrary local files. The resulting local file inclusion can expose sensitive data and may be leveraged to execute malicious code, compromising the confidentiality, integrity, and availability of the affected WordPress site.

Affected Systems

It affects the Mikado-Themes Powerlift theme in all releases prior to version 3.2.1, which can be identified by the vendor/product name Powerlift for WordPress.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity, while the very low EPSS (<1%) suggests exploitation is uncommon but still possible. The vulnerability is not yet catalogued in the CISA KEV list. Based on the description, the likely attack vector is remote: an attacker can trigger the inclusion by manipulating a publicly exposed URL or input field where the theme resolves paths. Successful exploitation would require access to the web application's file system or the ability to influence the include path.

Generated by OpenCVE AI on April 27, 2026 at 21:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Powerlift theme to version 3.2.1 or later to eliminate the vulnerability.
  • If an immediate upgrade is not possible, configure the server to disable dynamic file inclusion by setting allow_url_include to Off and applying open_basedir restrictions that limit inclusion to WordPress directories.
  • Deploy web‑application firewall rules or input filters to block requests that attempt to reference files outside the intended directories, reducing the risk of file inclusion attacks.

Generated by OpenCVE AI on April 27, 2026 at 21:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 28 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes powerlift
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes powerlift
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Powerlift powerlift allows PHP Local File Inclusion.This issue affects Powerlift: from n/a through < 3.2.1.
Title WordPress Powerlift theme < 3.2.1 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Mikado-themes Powerlift
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:27:15.571Z

Reserved: 2025-12-15T10:00:06.384Z

Link: CVE-2025-67940

cve-icon Vulnrichment

Updated: 2026-01-28T16:37:44.172Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:02.843

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-67940

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T21:45:14Z

Weaknesses