Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Greenmart greenmart allows PHP Local File Inclusion.This issue affects Greenmart: from n/a through <= 4.2.11.
Published: 2025-12-30
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Greenmart WordPress theme up to version 4.2.11 contains an improper control of the filename used in PHP include/require statements (CWE‑98). This flaw can enable an attacker to supply a crafted argument that causes the application to read or execute files from the local file system. If the attacker injects code into a readable file or writes a malicious file to a path that is later included, this can lead to the execution of arbitrary code or disclosure of sensitive data.

Affected Systems

The vulnerability affects the Greenmart theme supplied by thembay. Versions ranging from the initial release through 4.2.11 are impacted. Administrators using any of these releases on a WordPress site are potentially exposed.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity level. The EPSS score of less than 1% signals a low probability of exploitation at this time, and the issue is not listed in CISA’s KEV catalog. The likely attack vector is a local file inclusion that is triggered via web input to the theme; it is inferred that the attacker must be able to supply an input value that influences the include path, possibly through a publicly reachable page. Because the exploit relies on local file access, initial compromise may require that the attacker can write files to the server or find writable directories, but once achieved, the impact can be significant.

Generated by OpenCVE AI on April 29, 2026 at 18:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Greenmart theme to version 4.2.12 or later if available.
  • Restrict the use of dynamic include paths in the theme by configuring it to load files only from a vetted directory, or by removing any user‑controlled arguments that influence the include path.
  • Disable or remove WordPress’s built‑in file editing, ensure proper file permissions are set on the theme directory, and prevent write access to the server’s file system from the web root.

Generated by OpenCVE AI on April 29, 2026 at 18:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Thembay
Thembay greenmart
Wordpress
Wordpress wordpress
Vendors & Products Thembay
Thembay greenmart
Wordpress
Wordpress wordpress

Tue, 30 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Greenmart greenmart allows PHP Local File Inclusion.This issue affects Greenmart: from n/a through <= 4.2.11.
Title WordPress Greenmart theme <= 4.2.11 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Thembay Greenmart
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:33.386Z

Reserved: 2025-12-29T11:17:52.922Z

Link: CVE-2025-68983

cve-icon Vulnrichment

Updated: 2025-12-30T21:44:49.732Z

cve-icon NVD

Status : Deferred

Published: 2025-12-30T11:15:56.973

Modified: 2026-04-27T19:16:39.450

Link: CVE-2025-68983

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T18:30:17Z

Weaknesses