Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through <= 1.0.3.
Published: 2026-02-20
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion (Potential Arbitrary Code Execution)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an improper control of the filename used in a PHP include/require statement, allowing an attacker to include arbitrary local files. This can enable reading of sensitive files or execution of malicious PHP code if a crafted file is uploaded, leading to possible compromise of the WordPress site.

Affected Systems

The axiomthemes Photolia theme for WordPress is affected. All releases from the first version through 1.0.3 inclusive are vulnerable; version 1.0.4 and later are not impacted.

Risk and Exploitability

With a CVSS score of 8.1, the flaw represents a high severity risk. The EPSS score of less than 1% indicates a very low current exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote or local input that manipulates the file path used by PHP’s include statement, such as by sending crafted URLs or form submissions within the affected WordPress site.

Generated by OpenCVE AI on April 17, 2026 at 17:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Photolia theme update (any release newer than 1.0.3) to remove the vulnerable code paths.
  • If an immediate update is not possible, disable or remove the PHP include functionality that uses unvalidated file names, or enforce strict sanitization and whitelist only approved filenames for inclusion.
  • Review the site for any potential exploitation opportunities, restrict execution permissions on directories that should not contain PHP files, and ensure that no arbitrary file inclusion can be triggered.

Generated by OpenCVE AI on April 17, 2026 at 17:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes photolia
Wordpress
Wordpress wordpress
Vendors & Products Axiomthemes
Axiomthemes photolia
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through <= 1.0.3.
Title WordPress Photolia theme <= 1.0.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Photolia
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:37.463Z

Reserved: 2026-01-07T12:21:24.565Z

Link: CVE-2026-22362

cve-icon Vulnrichment

Updated: 2026-02-20T19:51:34.760Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:35.107

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:30:23Z

Weaknesses