Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Gaspard gaspard allows PHP Local File Inclusion.This issue affects Gaspard: from n/a through <= 1.3.
Published: 2026-03-25
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Immediate Patch
AI Analysis

Impact

Elated-Themes Gaspard theme contains a flaw where an attacker can influence the filename used in PHP include/require statements. This inappropriate control of the filename permits the inclusion of arbitrary local files that may contain PHP code, potentially enabling remote code execution or disclosure of sensitive data. The weakness is classified as a Local File Inclusion vulnerability and has a CVSS score of 8.1, indicating a high severity impact when exploited.

Affected Systems

Any WordPress site that has the Gaspard theme installed from the vendor Elated-Themes, with version 1.3 or earlier. No specific patch versions are listed beyond the fact that the issue affects all releases up to and including version 1.3.

Risk and Exploitability

The high CVSS rating reflects the significant risk to confidentiality, integrity, and availability should an attacker succeed. However, the low EPSS score (<1%) suggests that exploitation is currently uncommon. The vulnerability has not been catalogued by CISA's KEV list. Based on the description, the likely attack vector is local: an attacker able to influence the theme’s include paths—either through site configuration, user input, or preceding exploitation—could trigger the inclusion of malicious PHP files. Because the description indicates only local file inclusion, the threat is primarily confined to the server environment of the WordPress installation, but it can still lead to serious compromise through code execution. It is inferred that the attacker would need either authenticated access to the WordPress backend or a way to inject path parameters into the theme’s include logic. This inference is not directly stated in the CVE data and may vary per site configuration.

Generated by OpenCVE AI on March 26, 2026 at 20:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the Gaspard theme (greater than 1.3).
  • If an update is not immediately available, review the theme’s PHP files to identify any include/require statements that use user‑controlled input and remove or sanitize those calls.
  • Consider disabling or removing the Gaspard theme until a patch is released or the code is fixed.

Generated by OpenCVE AI on March 26, 2026 at 20:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Elated-themes
Elated-themes gaspard
Wordpress
Wordpress wordpress
Vendors & Products Elated-themes
Elated-themes gaspard
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Gaspard gaspard allows PHP Local File Inclusion.This issue affects Gaspard: from n/a through <= 1.3.
Title WordPress Gaspard theme <= 1.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Elated-themes Gaspard
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-26T18:31:42.651Z

Reserved: 2026-01-07T13:44:23.295Z

Link: CVE-2026-22493

cve-icon Vulnrichment

Updated: 2026-03-26T18:26:39.649Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:16:31.227

Modified: 2026-03-30T13:27:35.820

Link: CVE-2026-22493

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:46:53Z

Weaknesses