Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Buzz Stone | Magazine & Viral Blog WordPress Theme buzzstone allows PHP Local File Inclusion.This issue affects Buzz Stone | Magazine & Viral Blog WordPress Theme: from n/a through <= 1.0.2.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion – can lead to disclosure of sensitive files and potentially remote code execution if the included file is executed
Action: Immediate Patch
AI Analysis

Impact

The Buzz Stone WordPress theme contains an improper control of file names for PHP include/require operations. This flaw allows local file inclusion, meaning an attacker can cause the theme to read arbitrary files from the server. If an attacker can trick the site into including a file that contains malicious PHP code, this could lead to remote code execution. The vulnerability can also be used to read log files, configuration files, or other sensitive data, impacting confidentiality, integrity, and potentially availability if the attacker can upload or modify files. The likely attack vector is through unsanitized request parameters or template files that construct the file path for inclusion, but the exact entry point is not documented in the available information.

Affected Systems

AncoraThemes’ Buzz Stone – Magazine & Viral Blog WordPress Theme, all released versions up to and including 1.0.2 are affected. No specific sub‑version or patch level is listed as fixed, so any installation of the theme in this version range is vulnerable.

Risk and Exploitability

With a CVSS score of 8.1, the vulnerability is considered high severity. Although the EPSS score is less than 1%, indicating low probability of exploitation in the wild at the time of assessment, the lack of a KEV listing means no confirmed exploitation is documented. Given the nature of the flaw, an attacker with sufficient privileges or file upload capabilities could leverage local file inclusion to read or inject code, making the risk significant for any site that uses the vulnerable theme. The vulnerability tends to require direct access to the target site or the ability to influence the file path used by the theme, which could be achieved through existing untrusted input vectors or web forms that the theme processes. When combined with other weaknesses, such as insecure file upload mechanisms, the exploitability could increase, potentially leading to full remote code execution.

Generated by OpenCVE AI on April 15, 2026 at 23:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Buzz Stone theme to the latest stable release (any version > 1.0.2) which removes the LFI flaw.
  • If an update is not yet available, restrict the theme’s include paths by configuring the web server to deny access to sensitive directories or by editing the theme files to hard‑code a safe directory and validate any user input before passing it to include/require.
  • Disable PHP’s allow_url_include setting and, if possible, set file_uploads to Off or limit upload destinations to a dedicated, non‑executable directory; also ensure file permissions prevent execution of uploaded files.

Generated by OpenCVE AI on April 15, 2026 at 23:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes buzz Stone | Magazine & Viral Blog Wordpress Theme
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes buzz Stone | Magazine & Viral Blog Wordpress Theme
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Buzz Stone | Magazine & Viral Blog WordPress Theme buzzstone allows PHP Local File Inclusion.This issue affects Buzz Stone | Magazine & Viral Blog WordPress Theme: from n/a through <= 1.0.2.
Title WordPress Buzz Stone | Magazine & Viral Blog WordPress Theme theme <= 1.0.2 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes Buzz Stone | Magazine & Viral Blog Wordpress Theme
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:08.887Z

Reserved: 2026-02-19T09:51:35.296Z

Link: CVE-2026-27339

cve-icon Vulnrichment

Updated: 2026-03-09T12:55:44.415Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:24.500

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-27339

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:45:05Z

Weaknesses