Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme Tripgo tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a through < 1.5.6.
Published: 2026-03-19
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion vulnerability in WordPress Tripgo theme
Action: Patch
AI Analysis

Impact

The vulnerability arises from improper validation of filenames used in PHP include or require statements within the Tripgo theme. This flaw permits an attacker to supply arbitrary filenames, potentially exposing local file contents or executing arbitrary code. The weakness is classified as a Local File Inclusion vulnerability and is mapped to CWE-98.

Affected Systems

All deployments of the ovatheme Tripgo WordPress theme running any version prior to 1.5.6 are affected. This includes every available release from the earliest version up to but not including v1.5.6.

Risk and Exploitability

The EPSS score indicates an exploitation likelihood of less than 1 %, and the vulnerability is not listed in the CISA KEV catalog, suggesting a low probability of active exploitation. The description implies that an attacker would need to supply a malicious filename through a user‑controllable variable that reaches the theme’s include logic, likely via a crafted front‑end request or input form. While no public exploits have been documented, the potential for file disclosure or remote code execution warrants timely remediation.

Generated by OpenCVE AI on April 2, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tripgo theme to version 1.5.6 or later to remove the vulnerable include logic.
  • If an immediate update is not possible, restrict the theme’s file system access by removing write permissions from directories that the theme references and configuring a whitelist for files that may be included.
  • Monitor the site for abnormal inclusion attempts by reviewing error logs and employing security plugins that alert against file inclusion activity.

Generated by OpenCVE AI on April 2, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ovatheme Tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a before 1.5.6. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme Tripgo tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a through < 1.5.6.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 19 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Ovatheme
Ovatheme tripgo
Wordpress
Wordpress wordpress
Vendors & Products Ovatheme
Ovatheme tripgo
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ovatheme Tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a before 1.5.6.
Title WordPress Tripgo theme < 1.5.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Ovatheme Tripgo
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:10.768Z

Reserved: 2026-02-17T13:24:05.456Z

Link: CVE-2026-27093

cve-icon Vulnrichment

Updated: 2026-03-19T14:45:29.676Z

cve-icon NVD

Status : Deferred

Published: 2026-03-19T07:15:59.410

Modified: 2026-04-23T15:37:19.487

Link: CVE-2026-27093

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T08:00:00Z

Weaknesses