Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Tediss tediss allows PHP Local File Inclusion.This issue affects Tediss: from n/a through <= 1.2.4.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Upgrade Theme
AI Analysis

Impact

The vulnerable theme contains a file inclusion mechanism that fails to sanitize the filename supplied through user input. This flaw permits a local file inclusion (LFI) that can read arbitrary files from the server’s filesystem and, if a PHP file is delivered to the target, can lead to remote code execution or privilege escalation. The affected code is triggered by theme functions that use PHP include/require statements without proper validation of the file path parameter, which is a classic example of CWE‑98. Consequently, a malicious actor who can influence the inclusion path is able to compromise the confidentiality, integrity, and availability of the entire site.

Affected Systems

WordPress sites that have installed ThemeREX’s Tediss theme version 1.2.4 or earlier are impacted. The vulnerability applies to every instance of the theme, regardless of who manages the WordPress installation, because the flaw is embedded in the core template files of the theme itself.

Risk and Exploitability

The CVSS v3 base score of 8.1 reflects a high severity, and the EPSS score of less than 1% indicates a low current likelihood of exploitation in the wild, though the potential impact remains severe. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting no active widespread exploitation reports. The attack vector is likely local to the web application’s code flow; an attacker must be able to supply a controlled input that is interpreted as a file path in the inclusion routine. If successful, the attacker can read sensitive configuration files or upload a malicious PHP script that is subsequently executed, resulting in full control of the site. The absence of a public exploit combined with the high CVSS rating warrants prompt mitigation to avoid future exploitation.

Generated by OpenCVE AI on April 16, 2026 at 05:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tediss theme to the latest version or any patched release that removes the vulnerable include logic.
  • If a theme update is delayed, edit the theme’s PHP files to delete or hard‑code any dynamic include/require statements that accept user input, thereby preventing LFI from occurring.
  • Modify the PHP configuration to set allow_url_include to Off and ensure that fopen() and similar functions used in the theme cannot process user‑supplied URLs or paths.

Generated by OpenCVE AI on April 16, 2026 at 05:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex tediss
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex tediss
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Tediss tediss allows PHP Local File Inclusion.This issue affects Tediss: from n/a through <= 1.2.4.
Title WordPress Tediss theme <= 1.2.4 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Tediss
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:19.993Z

Reserved: 2026-02-25T12:12:58.153Z

Link: CVE-2026-27994

cve-icon Vulnrichment

Updated: 2026-03-06T19:51:40.492Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:31.873

Modified: 2026-03-06T20:16:14.553

Link: CVE-2026-27994

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:15:25Z

Weaknesses