Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Metro metro allows PHP Local File Inclusion.This issue affects Metro: from n/a through <= 2.13.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion leading to arbitrary code execution
Action: Patch
AI Analysis

Impact

The Metro WordPress theme contains an improper control of filename for include/require statements, a local file inclusion flaw. This allows an attacker to manipulate the path parameter so that the theme reads and executes files from the local server file system. Successful exploitation can grant the attacker remote code execution and compromise the confidentiality, integrity, and availability of the WordPress site.

Affected Systems

All installations of the RadiusTheme Metro theme version 2.13 and earlier are affected. Sites using those versions are exposed, while releases newer than 2.13 are considered safe.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, whereas the EPSS score of < 1% suggests a low current exploitation probability. The vulnerability is not listed in the KEV catalog, implying no publicly documented attacks. The most likely attack vector is a crafted HTTP request that supplies a tampered file path to the theme’s include logic, enabling the server to read and execute arbitrary PHP code.

Generated by OpenCVE AI on April 16, 2026 at 05:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Metro theme to a version newer than 2.13 to apply the fix
  • Modify the theme’s code to validate and whitelist file paths used in include/require statements, ensuring only trusted directories are accessed
  • Configure PHP to disable remote file loading by setting allow_url_include and allow_url_fopen to Off

Generated by OpenCVE AI on April 16, 2026 at 05:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Radiustheme
Radiustheme metro
Wordpress
Wordpress wordpress
Vendors & Products Radiustheme
Radiustheme metro
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Metro metro allows PHP Local File Inclusion.This issue affects Metro: from n/a through <= 2.13.
Title WordPress Metro theme <= 2.13 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Radiustheme Metro
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:14.164Z

Reserved: 2026-02-19T09:51:58.587Z

Link: CVE-2026-27383

cve-icon Vulnrichment

Updated: 2026-03-09T12:45:26.683Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:27.703

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-27383

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:15:25Z

Weaknesses