Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX ConFix confix allows PHP Local File Inclusion.This issue affects ConFix: from n/a through <= 1.013.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Patch Now
AI Analysis

Impact

The bug is an improper control of the filename used in a PHP include or require statement inside the ThemeREX ConFix WordPress theme. An attacker who can influence the filename may cause the theme to include and execute code from any local file that the web server can access, leading to confidentiality and integrity compromise of the site.

Affected Systems

The ConFix theme, as distributed by ThemeREX, is affected in all releases up to and including version 1.013. Any WordPress website that has installed one of those versions of the theme is vulnerable; the flaw does not depend on the PHP interpreter or web server configuration beyond the presence of the theme files.

Risk and Exploitability

The CVSS base score of 8.1 indicates a high severity vulnerability, yet the EPSS score is below 1% and it is not listed in the CISA KEV catalog, implying that widespread exploitation is unlikely at this time. The likely attack vector is a remote attacker sending a crafted request that propagates a user‑controlled string into the filename used in the include/require call; this inference is drawn from the description of how the filename is not properly validated. If successful, the attacker could read sensitive configuration files or run arbitrary PHP code residing on the file system.

Generated by OpenCVE AI on April 16, 2026 at 12:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the ConFix theme to the latest available version that incorporates a fix for the include/require logic flaw.
  • If an upgrade cannot be performed immediately, constrain PHP’s file inclusion scope by configuring open_basedir to restrict access to the theme’s directory and disabling any options that allow arbitrary file paths to be passed to include/require functions.
  • Apply input validation in the theme’s code to ensure that only files located within the intended directory hierarchy can be included, as recommended for mitigating CWE‑98 vulnerabilities.

Generated by OpenCVE AI on April 16, 2026 at 12:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex confix
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex confix
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX ConFix confix allows PHP Local File Inclusion.This issue affects ConFix: from n/a through <= 1.013.
Title WordPress ConFix theme <= 1.013 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Confix
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:19.027Z

Reserved: 2026-02-25T12:12:49.964Z

Link: CVE-2026-27990

cve-icon Vulnrichment

Updated: 2026-03-06T20:39:02.878Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:31.327

Modified: 2026-03-06T21:16:14.773

Link: CVE-2026-27990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:45:35Z

Weaknesses