Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in goalthemes Pippo pippo allows PHP Local File Inclusion.This issue affects Pippo: from n/a through <= 1.2.3.
Published: 2026-01-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper control of the filename used in a PHP include/require statement, classified as CWE‑98. By manipulating the filename argument, an attacker can include arbitrary files from the local filesystem, potentially reading sensitive files or executing malicious code. The flaw directly compromises confidentiality, integrity, and availability of the affected WordPress installation.

Affected Systems

All installations of the Pippo theme provided by goalthemes with a version of 1.2.3 or earlier are affected. The vulnerability applies to all releases from the first documented build through 1.2.3; versions beyond 1.2.3 are not impacted.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity vulnerability, while the EPSS score of "< 1%" suggests a low likelihood of exploitation at the time of this assessment. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a Local File Inclusion that an attacker could trigger by supplying a crafted filename in a request, such as via a URL parameter or form input. Successful exploitation could allow the attacker to read restricted files or execute arbitrary PHP code, thereby fully compromising the affected WordPress site.

Generated by OpenCVE AI on April 29, 2026 at 10:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Pippo theme to a version newer than 1.2.3 (or the latest available release).
  • If an upgrade is not immediately possible, apply the patch or code changes documented by the vendor or security community to remove or properly validate the filename used in the include/require operation.
  • Configure PHP to disable allow_url_include and enforce open_basedir restrictions so that even if LFI is attempted, the attacker cannot read or execute files outside allowed directories.

Generated by OpenCVE AI on April 29, 2026 at 10:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Goalthemes
Goalthemes pippo
Wordpress
Wordpress wordpress
Vendors & Products Goalthemes
Goalthemes pippo
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in goalthemes Pippo pippo allows PHP Local File Inclusion.This issue affects Pippo: from n/a through <= 1.2.3.
Title WordPress Pippo theme <= 1.2.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Goalthemes Pippo
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:34:36.907Z

Reserved: 2025-12-29T11:18:40.734Z

Link: CVE-2025-69037

cve-icon Vulnrichment

Updated: 2026-01-28T16:51:35.500Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:16.753

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-69037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:45:09Z

Weaknesses