Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Emaurri emaurri allows PHP Local File Inclusion.This issue affects Emaurri: from n/a through <= 1.0.1.
Published: 2026-03-25
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion with potential code execution or data disclosure
Action: Immediate Patch
AI Analysis

Impact

The Emaurri WordPress theme validates user input incorrectly in a PHP include/require statement, allowing arbitrary filenames to be supplied. By controlling this filename, an attacker can include files from the server’s filesystem. This can expose configuration files or source code, and if the attacker can place malicious PHP files in an accessible location, they may achieve remote code execution with the web server’s privileges.

Affected Systems

All installations of the Mikado‑Themes Emaurri theme version 1.0.1 or earlier are vulnerable. Versions prior to this are not known to be affected. Any WordPress site using a susceptible theme is at risk.

Risk and Exploitability

The flaw carries a CVSS score of 8.1, indicating high severity, yet the EPSS score is below 1%, meaning real‑world exploitation is currently unlikely. The vulnerability is not catalogued in CISA’s Known Exploited Vulnerabilities. The likely attack vector requires the attacker to influence the filename used in the include statement, which can be inferred to be achieved through the theme’s public interfaces or via another vulnerability that permits arbitrary file upload or manipulation. Successful exploitation could lead to arbitrary file read or execution of code with web server permissions.

Generated by OpenCVE AI on March 26, 2026 at 17:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Patch the Mikado‑Themes Emaurri theme to version greater than 1.0.1 as soon as possible
  • If an update is unavailable, deactivate and uninstall the vulnerable theme to eliminate the attack surface
  • Implement WAF rules to block requests that attempt to include non‑existent files or use directory traversal patterns
  • Monitor web application logs for anomalous file inclusion attempts and investigate suspicious activity

Generated by OpenCVE AI on March 26, 2026 at 17:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes emaurri
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes emaurri
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Emaurri emaurri allows PHP Local File Inclusion.This issue affects Emaurri: from n/a through <= 1.0.1.
Title WordPress Emaurri theme <= 1.0.1 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Mikado-themes Emaurri
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:10.652Z

Reserved: 2026-02-17T13:23:51.341Z

Link: CVE-2026-27078

cve-icon Vulnrichment

Updated: 2026-03-26T15:06:56.855Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:16:55.313

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-27078

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:31:23Z

Weaknesses