Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Softwebmedia Gyan Elements gyan-elements allows PHP Local File Inclusion.This issue affects Gyan Elements: from n/a through <= 2.2.1.
Published: 2026-01-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion that could enable remote code execution
Action: Patch Immediately
AI Analysis

Impact

CVE-2026-23978 is a flaw in the Softwebmedia Gyan Elements WordPress plugin that improperly controls filenames used in PHP include/require statements, allowing an attacker to perform local file inclusion. The vulnerability is categorized as CWE-98. By exploiting this weakness, an attacker could read arbitrary files on the server; if malicious code can be introduced or executed via the included file, it may lead to code execution, data disclosure, or further compromise of the WordPress site.

Affected Systems

The issue affects all releases of the Gyan Elements plugin from the initial version up through 2.2.1. No later versions are known to be vulnerable.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.8, indicating a severe potential impact. EPSS scoring shows a very low probability of exploitation (<1%), and the flaw is not yet listed in the CISA KEV catalog. Attackers would likely trigger the LFI by manipulating a user-supplied parameter that the plugin uses directly in an include or require call; the vector would be through an HTTP request to the WordPress site. Success would depend on the ability to locate and read files on the web root or server, and on the server’s configuration allowing execution of included PHP code.

Generated by OpenCVE AI on April 16, 2026 at 02:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Gyan Elements to the latest available version that removes the insecure file inclusion logic.
  • If an upgrade is not feasible, configure a web application firewall or .htaccess rules to block directory traversal sequences (e.g., "../") and to disallow unexpected file extensions from being processed by the plugin.
  • Adjust filesystem permissions so that the web server user has read access only to necessary WordPress directories, preventing the inclusion of sensitive files such as configuration or system binaries.

Generated by OpenCVE AI on April 16, 2026 at 02:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 26 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Softwebmedia Gyan Elements gyan-elements allows PHP Local File Inclusion.This issue affects Gyan Elements: from n/a through <= 2.2.1.
Title WordPress Gyan Elements plugin <= 2.2.1 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:04.024Z

Reserved: 2026-01-19T16:14:52.937Z

Link: CVE-2026-23978

cve-icon Vulnrichment

Updated: 2026-01-23T16:48:54.671Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:38.450

Modified: 2026-04-23T15:36:41.053

Link: CVE-2026-23978

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:15:21Z

Weaknesses