Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Green Thumb greenthumb allows PHP Local File Inclusion.This issue affects Green Thumb: from n/a through <= 1.1.12.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Update Theme
AI Analysis

Impact

The vulnerability arises from inadequate control over the filename supplied to PHP include/require statements in the WordPress Green Thumb theme. This flaw permits the attacker to force the inclusion of arbitrary local files, enabling reading of sensitive files or execution of malicious PHP code residing on the site's filesystem. Consequently, an exploited site could suffer unauthorized disclosure of configuration information, user credentials, or full remote code execution if the attacker supplies a PHP script to be included.

Affected Systems

The issue affects the Green Thumb theme supplied by ThemeREX, all versions up through and including 1.1.12. Any WordPress site that has installed these versions of the theme is vulnerable to the LFI flaw.

Risk and Exploitability

The flaw carries a CVSS score of 8.1, reflecting high severity. Its EPSS score is reported as less than 1%, suggesting a low likelihood of active exploitation at present, and it is not listed in the CISA KEV catalog. The most likely attack vector involves unauthenticated web requests that supply malicious input to influence the include path, although documented exploitation evidence is not provided in the description.

Generated by OpenCVE AI on April 16, 2026 at 12:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Green Thumb theme to the latest release that removes the flaw.
  • If an upgrade is not available, disable or delete the theme from the WordPress installation to eliminate the vulnerable code path.
  • As an interim measure, restrict the PHP include path using open_basedir or server configuration rules, and apply input validation to any filename parameters so that only permitted paths are processed.

Generated by OpenCVE AI on April 16, 2026 at 12:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex green Thumb
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex green Thumb
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Green Thumb greenthumb allows PHP Local File Inclusion.This issue affects Green Thumb: from n/a through <= 1.1.12.
Title WordPress Green Thumb theme <= 1.1.12 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Green Thumb
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:24.408Z

Reserved: 2026-02-25T12:13:12.448Z

Link: CVE-2026-28017

cve-icon Vulnrichment

Updated: 2026-03-06T15:30:45.621Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:33.883

Modified: 2026-03-06T16:16:12.370

Link: CVE-2026-28017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:45:35Z

Weaknesses