Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Prowess prowess allows PHP Local File Inclusion.This issue affects Prowess: from n/a through <= 2.3.
Published: 2026-01-23
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Immediate Patch
AI Analysis

Impact

The Prowess theme for WordPress contains an improper control of filenames used in include/require statements that enables local file inclusion. This flaw, classified as CWE-98, allows an attacker to cause arbitrary local files on the server to be read or executed within the context of the web application. The primary impact is the exposure of sensitive information or execution of unintended code, which could compromise the confidentiality, integrity, or availability of the site. The CVSS score of 9.8 indicates a high severity vulnerability.

Affected Systems

The vulnerability is present in all releases of the Select‑Themes Prowess theme up to and including version 2.3. Any WordPress site that has Prowess 2.3 or an earlier version installed is affected. No specific patch version is provided, so the recommended action is to upgrade to a version newer than 2.3 if one exists or to remove the theme entirely.

Risk and Exploitability

With a score of 9.8 the risk level is high, yet the EPSS score of less than 1% suggests that active exploitation is currently low. The flaw is not listed in the CISA KEV catalog. The attack vector is inferred to involve an attacker influencing the data that determines the include path, such as through a manipulated query parameter or theme configuration option, to specify a local file. Successful exploitation requires the attacker to influence the server so that the include statement resolves to an arbitrary file.

Generated by OpenCVE AI on April 16, 2026 at 07:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Prowess theme to the latest release that contains the LFI fix (any release newer than 2.3, if available).
  • If upgrading is not possible, remove or disable the Prowess theme from the WordPress installation to eliminate the vulnerable code.
  • As a temporary measure, restrict direct access to PHP files inside the theme directory with web server rules (e.g., .htaccess) to reduce the attack surface until an upgrade can be applied.

Generated by OpenCVE AI on April 16, 2026 at 07:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Prowess prowess allows PHP Local File Inclusion.This issue affects Prowess: from n/a through <= 2.3.
Title WordPress Prowess theme <= 2.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:14.223Z

Reserved: 2026-01-23T12:31:40.820Z

Link: CVE-2026-24531

cve-icon Vulnrichment

Updated: 2026-01-26T19:09:03.644Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:09.127

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24531

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:45:06Z

Weaknesses