Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LaunchandSell Tribe tribe allows PHP Local File Inclusion.This issue affects Tribe: from n/a through <= 1.7.3.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Patch Now
AI Analysis

Impact

The vulnerability arises from improper control of filenames used in PHP include/require statements, allowing an attacker to trigger the application to locally include arbitrary files. This can lead to disclosure of sensitive files such as configuration or user data, and in some scenarios may enable execution of malicious code if an attacker can influence the path to a payload. The weakness corresponds to CWE‑98.

Affected Systems

LaunchandSell's Tribe WordPress theme, versions up to and including 1.7.3, is affected.

Risk and Exploitability

The CVSS score is 8.1, indicating high severity, while the EPSS score is less than 1 %, suggesting a low likelihood of exploitation at present; the vulnerability is not listed in the CISA KEV catalog. The likely attack path requires an attacker to trigger the vulnerable include with a crafted file path via exposed query parameters or inputs that influence the filename; once exploited, the attacker could read sensitive files and potentially achieve code execution if file upload or payload delivery is possible.

Generated by OpenCVE AI on April 16, 2026 at 05:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tribe theme to version 1.7.4 or later to remove the vulnerable code.
  • If an upgrade cannot be performed immediately, disable or delete the theme to eliminate the vulnerable code path.
  • Verify that file permissions on the WordPress upload directory and other directories referenced by include statements are restrictive, and monitor web traffic for attempts to access the vulnerable include endpoint.

Generated by OpenCVE AI on April 16, 2026 at 05:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Launchandsell
Launchandsell tribe
Wordpress
Wordpress wordpress
Vendors & Products Launchandsell
Launchandsell tribe
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LaunchandSell Tribe tribe allows PHP Local File Inclusion.This issue affects Tribe: from n/a through <= 1.7.3.
Title WordPress Tribe theme <= 1.7.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Launchandsell Tribe
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:51.334Z

Reserved: 2026-01-07T12:22:12.277Z

Link: CVE-2026-22442

cve-icon Vulnrichment

Updated: 2026-03-09T16:20:23.072Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:18.793

Modified: 2026-03-09T17:16:16.000

Link: CVE-2026-22442

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:30:25Z

Weaknesses