Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Overton overton allows PHP Local File Inclusion.This issue affects Overton: from n/a through <= 1.3.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion potentially enabling arbitrary file access or code execution
Action: Patch Now
AI Analysis

Impact

The Overton theme for WordPress contains an insecure include/require statement that accepts a filename from user input without adequate validation. This flaw allows an attacker to supply an arbitrary local file path, causing the theme to read or execute that file. The consequences range from leaking sensitive configuration files to running malicious PHP code if the server permits local file inclusion.

Affected Systems

The vulnerability affects Mikado-Themes’ Overton theme for WordPress versions up to and including 1.3. Any site running this or earlier versions is vulnerable; releases beyond 1.3 are reported by the vendor to be unaffected.

Risk and Exploitability

A CVSS score of 8.1 classifies the flaw as high severity. The EPSS score is less than 1%, indicating that exploitation attempts are rarely recorded, and the issue is not listed in the CISA KEV catalog. Attackers could exploit the vulnerability by crafting a malicious URL that supplies a path to a sensitive file or a malicious PHP script, assuming the server configuration permits local file inclusion. Successful exploitation may enable access to files such as wp-config.php or the execution of arbitrary code within the WordPress context.

Generated by OpenCVE AI on April 16, 2026 at 05:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Overton theme to version 1.4 or later, which removes the insecure include statement.
  • If an upgrade is not immediately possible, disable or remove the theme from the WordPress installation until a patch can be applied.
  • Apply server-side hardening by disabling PHP's allow_url_include, enabling open_basedir restrictions, and ensuring that any user‑supplied paths are validated or sanitized before inclusion.

Generated by OpenCVE AI on April 16, 2026 at 05:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes overton
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes overton
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Overton overton allows PHP Local File Inclusion.This issue affects Overton: from n/a through <= 1.3.
Title WordPress Overton theme <= 1.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Mikado-themes Overton
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:44.447Z

Reserved: 2026-01-07T12:21:56.448Z

Link: CVE-2026-22405

cve-icon Vulnrichment

Updated: 2026-03-09T16:55:32.399Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:14.480

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-22405

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:45:26Z

Weaknesses