Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bonbon bonbon allows PHP Local File Inclusion.This issue affects Bonbon: from n/a through <= 1.6.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Patch
AI Analysis

Impact

Improper control of file names in PHP include/require statements allows attackers to trigger local file inclusion in the Bonbon WordPress theme. The flaw, identified as CWE‑98, could enable an attacker to execute arbitrary PHP code on a vulnerable site if a crafted file path can be supplied. The vulnerability is described as a PHP Remote File Inclusion issue that operates as local file inclusion, jeopardizing the confidentiality, integrity, and availability of the affected WordPress installation.

Affected Systems

The ThemeREX Bonbon WordPress theme is affected. All versions up through 1.6 are vulnerable; no later version information is provided.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity vulnerability. The EPSS rating of less than 1% suggests that exploitable incidents are relatively rare, yet the flaw can be leveraged in a local context if an attacker can influence file inclusion paths. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local file inclusion driven by unsanitized inputs in the theme’s PHP code, potentially requiring local access or a path traversal capability to abuse the flaw.

Generated by OpenCVE AI on April 16, 2026 at 04:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Bonbon theme to the latest release that contains the fix for the local file inclusion vulnerability.
  • If no fix is currently available, disable or remove the Bonbon theme until a patch is released, or replace it with a vetted, secure alternative.
  • Review the theme's code or WordPress configuration to ensure that any dynamic file paths are validated against an allowed list, and configure the application to prevent unchecked includes based on user input.

Generated by OpenCVE AI on April 16, 2026 at 04:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex bonbon
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex bonbon
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bonbon bonbon allows PHP Local File Inclusion.This issue affects Bonbon: from n/a through <= 1.6.
Title WordPress Bonbon theme <= 1.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Bonbon
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:27.457Z

Reserved: 2026-02-25T12:13:18.740Z

Link: CVE-2026-28030

cve-icon Vulnrichment

Updated: 2026-03-06T19:24:12.190Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:35.637

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-28030

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:00:09Z

Weaknesses