Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in uxper Golo golo allows PHP Local File Inclusion.This issue affects Golo: from n/a through < 1.7.5.
Published: 2026-01-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion that could lead to sensitive file disclosure or remote code execution
Action: Patch Immediately
AI Analysis

Impact

The vulnerability arises from improper validation of filenames used in PHP include/require statements within the Golo theme. This flaw permits an attacker to manipulate the file path supplied to an include, resulting in a Local File Inclusion (LFI). Through LFI, an attacker can read arbitrary files on the server, potentially exposing sensitive configuration data, credentials, or application code. In environments where the included files are executable or further processed, the LFI can also enable Remote Code Execution, escalating the impact from data disclosure to full system compromise. The root weakness is associated with CWE‑98, indicating a failure to safely handle include paths.

Affected Systems

The vulnerability affects all installations of the uxper Golo WordPress theme older than version 1.7.5. Users running any of these versions should inspect whether the theme is present in their WordPress instance and determine if they have the listed and older versions installed.

Risk and Exploitability

The CVSS score of 9.8 reflects the high severity of this flaw, and the very low EPSS score (<1%) indicates that, as of the last measurement, exploitation attempts are currently scarce. However, the combination of a severe local file inclusion flaw and the potential for escalation to code execution makes this a critical risk. The vulnerability is not listed in the CISA KEV catalog, but its impact warrants immediate attention, particularly in systems exposed to untrusted input that might reach the theme’s include logic. Attackers would need to craft a request that passes a manipulated filename to the theme’s inclusion logic; no known active exploits have been publicly reported, yet the nature of the flaw makes it a strong candidate for future exploitation.

Generated by OpenCVE AI on April 16, 2026 at 02:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Golo theme to version 1.7.5 or later to remove the vulnerable inclusion code.
  • If an upgrade is not immediately possible, restrict the theme’s ability to include arbitrary files by configuring PHP’s open_basedir to limit included paths strictly to the theme directory.
  • Implement input validation or sanitization for any parameters that influence file inclusion paths used by the theme, ensuring only whitelisted directories or filenames are processed.

Generated by OpenCVE AI on April 16, 2026 at 02:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 26 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Uxper
Uxper golo
Wordpress
Wordpress wordpress
Vendors & Products Uxper
Uxper golo
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in uxper Golo golo allows PHP Local File Inclusion.This issue affects Golo: from n/a through < 1.7.5.
Title WordPress Golo theme < 1.7.5 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:04.045Z

Reserved: 2026-01-19T16:14:52.937Z

Link: CVE-2026-23975

cve-icon Vulnrichment

Updated: 2026-01-23T16:49:03.353Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:38.210

Modified: 2026-04-23T15:36:40.587

Link: CVE-2026-23975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:15:21Z

Weaknesses