Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Coinpress coinpress allows PHP Local File Inclusion.This issue affects Coinpress: from n/a through <= 1.0.14.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion potentially leading to code execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an improper control of the filename in a PHP include/require statement. An attacker could supply a crafted filename that is resolved on the file system, allowing inclusion of local files. Because the inclusion occurs within the theme’s PHP code, arbitrary code execution is possible after the file is included. The weakness is classified as CWE-98 and carries a CVSS score of 8.1, indicating high severity. The impact manifests as a loss of confidentiality, integrity, and availability for the affected site once the attacker gains code execution.

Affected Systems

Coinpress theme for WordPress, developed by ThemeREX, is affected on all releases from the initial available version up to and including 1.0.14. Users who have installed any of these versions and are maintaining the theme with the default file include logic are impacted. No specific WordPress core versions are listed as affected.

Risk and Exploitability

The EPSS score is reported as less than 1%, suggesting a low probability of exploitation in the wild at the time of analysis. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is a local file inclusion triggered by a parameter sent to the theme or a crafted URL that influences the include path. Successful exploitation would require that the attacker can control the input to the file inclusion mechanism, a condition that can be met via a weakness in the theme’s producer or a misconfiguration of WordPress that allows remote file uploads or path manipulation.

Generated by OpenCVE AI on April 16, 2026 at 12:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Coinpress theme to a version newer than 1.0.14, which removes the vulnerable include logic.
  • If an upgrade is not available, remove or disable the theme until it can be patched. Verify that the theme’s file inclusion points are disabled or have hard‑coded safe paths.
  • Implement input validation or hard‑code the file list in the theme’s PHP code to prevent arbitrary files from being included and ensure that the server’s include paths restrict to the theme directory only.

Generated by OpenCVE AI on April 16, 2026 at 12:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex coinpress
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex coinpress
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Coinpress coinpress allows PHP Local File Inclusion.This issue affects Coinpress: from n/a through <= 1.0.14.
Title WordPress Coinpress theme <= 1.0.14 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Coinpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:22.360Z

Reserved: 2026-02-25T12:13:06.634Z

Link: CVE-2026-28007

cve-icon Vulnrichment

Updated: 2026-03-05T19:57:01.302Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:32.687

Modified: 2026-03-05T20:16:12.847

Link: CVE-2026-28007

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:45:35Z

Weaknesses