Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in scriptsbundle AdForest adforest allows PHP Local File Inclusion.This issue affects AdForest: from n/a through <= 6.0.11.
Published: 2026-01-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Immediate Patch
AI Analysis

Impact

Based on the description, this vulnerability in the AdForest WordPress theme arises from inadequate validation of the filename supplied to PHP’s include/require statements. An attacker can supply a crafted value that forces the theme to include any local file on the server, allowing the attacker to read sensitive configuration files or, if the included file contains PHP code, potentially execute arbitrary code on the server. The weakness is categorized as CWE‑98 and could lead to confidentiality and integrity compromises. The potential for remote code execution is inferred if the attacker supplies a PHP file containing malicious code.

Affected Systems

The issue affects the AdForest theme developed by scriptsbundle. All released versions from the first build up to and including 6.0.11 are impacted. Site owners running these versions on a WordPress installation should verify whether they are using an affected theme.

Risk and Exploitability

The CVSS score of 8.1 classifies this flaw as high severity. The EPSS score is reported as less than 1%, indicating a very low current exploitation probability. It is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers would need to influence the include path, most likely through a crafted request to a publicly accessible page served by the theme, and the flaw does not require login or elevated privileges. The possibility of remote code execution is inferred from the vulnerability description, making the threat noteworthy despite the low exploitation probability.

Generated by OpenCVE AI on April 28, 2026 at 18:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AdForest WordPress theme to version 6.0.12 or newer.
  • Disable remote file inclusion by setting "allow_url_include = Off" in php.ini and ensuring that include_path is not dynamically modified.
  • Restrict file system permissions so that non-privileged users cannot read or write sensitive files within the theme directory, and remove any PHP files that should not be directly accessible.
  • Deploy web application firewall rules that block requests containing directory traversal patterns in include parameters.

Generated by OpenCVE AI on April 28, 2026 at 18:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Scriptsbundle
Scriptsbundle adforest
Wordpress
Wordpress wordpress
Vendors & Products Scriptsbundle
Scriptsbundle adforest
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in scriptsbundle AdForest adforest allows PHP Local File Inclusion.This issue affects AdForest: from n/a through <= 6.0.11.
Title WordPress AdForest theme <= 6.0.11 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Scriptsbundle Adforest
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:27:42.343Z

Reserved: 2025-12-15T10:00:06.384Z

Link: CVE-2025-67946

cve-icon Vulnrichment

Updated: 2026-01-28T16:11:50.347Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:04.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-67946

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:15:37Z

Weaknesses