Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in stmcan NaturaLife Extensions naturalife-extensions allows PHP Local File Inclusion.This issue affects NaturaLife Extensions: from n/a through <= 2.1.
Published: 2026-03-25
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Patch Immediately
AI Analysis

Impact

An attacker can supply an arbitrary filename that is later used in a PHP include or require statement inside the NaturaLife Extensions plugin, allowing the attacker to read any file on the web server’s file system that the web server process can access. If a writable or executable PHP file is included, the attacker could execute arbitrary PHP code, effectively achieving remote code execution. The weakness is a classic improper control of filename in include/require, a condition that also permits disclosure of sensitive files such as configuration data.

Affected Systems

Any WordPress website that has the NaturaLife Extensions plugin installed in a version up through and including 2.1 is vulnerable. Administrators managing sites running these plugin versions should verify their current plugin release before taking remediation steps.

Risk and Exploitability

The CVSS score of 8.1 places this vulnerability in the high severity category, reflecting substantial potential for data disclosure and code execution. The EPSS calculation indicates a probability of exploitation below 1 percent, suggesting that while the attack is technically straightforward, it is not widely active at present. The flaw has not been catalogued as a known exploited vulnerability by CISA, which further reduces the likelihood of mass exploitation. Nonetheless, the required payload is a single unauthenticated HTTP request with a crafted filename parameter, making exploitation extremely low effort for an attacker who wants to attempt the vulnerability.

Generated by OpenCVE AI on March 26, 2026 at 20:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the NaturaLife Extensions plugin to version 2.2 or later as soon as a vendor patch is released.
  • If an update is not immediately available, modify the plugin’s include logic so that only files in a known, trusted directory are allowed and any other path is rejected.
  • Restrict the web server from serving files that reside in directories containing sensitive configuration such as /wp-config.php and other application secrets.
  • Review and tighten file permissions so that the web server user cannot read files it does not need for normal operation.
  • Inspect web server logs for anomalous requests that request absolute or relative paths pointing to system or application files and investigate any such activity promptly.

Generated by OpenCVE AI on March 26, 2026 at 20:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Stmcan
Stmcan naturalife Extensions
Wordpress
Wordpress wordpress
Vendors & Products Stmcan
Stmcan naturalife Extensions
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in stmcan NaturaLife Extensions naturalife-extensions allows PHP Local File Inclusion.This issue affects NaturaLife Extensions: from n/a through <= 2.1.
Title WordPress NaturaLife Extensions plugin <= 2.1 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Stmcan Naturalife Extensions
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:07.692Z

Reserved: 2026-01-28T09:51:55.182Z

Link: CVE-2026-25017

cve-icon Vulnrichment

Updated: 2026-03-26T17:39:05.704Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:16:42.020

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-25017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:46:11Z

Weaknesses