Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through <= 3.1.
Published: 2026-01-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion that can lead to code execution or sensitive data disclosure
Action: Patch
AI Analysis

Impact

This vulnerability stems from improper validation of filenames used in PHP include/require statements within the Elated‑Themes Laurent WordPress theme. An attacker who can influence the filename supplied to the include mechanism may cause arbitrary local files to be read or executed, potentially exposing sensitive data or achieving remote code execution. The flaw is classified as CWE‑98, Local File Inclusion.

Affected Systems

WordPress sites that use the Elated‑Themes Laurent theme versions 3.1 or earlier are affected. These versions— from the earliest release up to 3.1—contain the vulnerable include logic.

Risk and Exploitability

The CVSS score for this issue is 7.5, indicating moderate to high severity, while the EPSS value of less than 1% suggests a very low exploitation probability at this time. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, which reduces the likelihood of a widespread pre‑existing exploit. The most likely attack vector is a remote attacker abusing a publicly exposed PHP page that accepts a filename parameter, but the specific vector is inferred from the nature of the flaw.

Generated by OpenCVE AI on April 16, 2026 at 01:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Laurent theme to the latest available version that removes the vulnerable include logic (version 3.2 or later).
  • If an immediate update is not possible, restrict the file inclusion context by enabling PHP's open_basedir or by modifying the theme code to validate filenames against an allow‑list before inclusion.
  • Deploy a web application firewall or similar filtering rules to block requests containing typical LFI patterns such as “../../../../etc/passwd” or PHP stream wrappers.

Generated by OpenCVE AI on April 16, 2026 at 01:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through <= 3.1.
Title WordPress Laurent theme <= 3.1 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:25.261Z

Reserved: 2026-01-23T12:32:17.047Z

Link: CVE-2026-24609

cve-icon Vulnrichment

Updated: 2026-01-23T17:07:31.723Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:19.850

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24609

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:45:20Z

Weaknesses