Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX MoneyFlow moneyflow allows PHP Local File Inclusion.This issue affects MoneyFlow: from n/a through <= 1.0.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion (potential execution)
Action: Immediate Patch
AI Analysis

Impact

This vulnerability occurs because the MoneyFlow theme fails to properly control the filename used in PHP include/require statements, allowing an attacker to craft requests that cause the application to include unintended local files. The flaw can lead to disclosure of sensitive configuration files, user credentials, or even execution of arbitrary PHP code if the attacker can influence the path to a file that contains malicious content. The weakness is categorized as CWE‑98, which highlights improper handling of file names in include operations.

Affected Systems

The impact applies to the ThemeREX MoneyFlow theme for WordPress, affecting all installations of version 1.0 and earlier. No specific patch versions are listed in the advisory; vendors recommend using a newer release if available.

Risk and Exploitability

The CVSS base score of 8.1 indicates a high‑severity flaw; the EPSS score of less than 1% suggests a low likelihood of mass exploitation at present. This issue is not currently listed in the CISA KEV catalog. Because the vulnerability relies on an attacker manipulating request parameters that dictate a file path, the attack vector is inferred to be through the public web interface, typically by submitting a crafted URL that the theme processes without validation.

Generated by OpenCVE AI on April 16, 2026 at 04:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MoneyFlow theme to the latest release that contains the LFI fix if one is available.
  • If an update is not yet released, restrict or validate the filenames used in include/require calls by whitelisting known safe paths and rejecting arbitrary input.
  • Modify file system permissions so that the WordPress web process can read only the directories containing legitimate theme files and cannot read sensitive configuration files.

Generated by OpenCVE AI on April 16, 2026 at 04:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex moneyflow
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex moneyflow
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX MoneyFlow moneyflow allows PHP Local File Inclusion.This issue affects MoneyFlow: from n/a through <= 1.0.
Title WordPress MoneyFlow theme <= 1.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Moneyflow
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:27.102Z

Reserved: 2026-02-25T12:13:18.740Z

Link: CVE-2026-28028

cve-icon Vulnrichment

Updated: 2026-03-06T19:31:21.154Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:35.373

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-28028

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:00:09Z

Weaknesses