Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edifice edifice allows PHP Local File Inclusion.This issue affects Edifice: from n/a through <= 1.8.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion leading to potential remote code execution
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is an improper control of filenames in PHP include/require statements, categorized as a Local File Inclusion (CWE‑98). An attacker can supply crafted input that causes the Edifice theme to include arbitrary local files, potentially exposing sensitive configuration data or executing attacker‑supplied PHP code. This allows a privileged attacker or one with basic web access to read or run files on the server, leading to confidentiality and integrity violations and possibly full remote code execution.

Affected Systems

The flaw affects the WordPress theme authored by ThemeREX, named Edifice, in all releases through version 1.8. Users who have not upgraded beyond 1.8 are susceptible.

Risk and Exploitability

The CVSS score of 8.1 reflects a high severity vulnerability that can be triggered by remote attackers via the web interface when the Edifice theme is active (inferred). The EPSS value is below 1%, indicating a very low current exploit probability, and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog. While the likelihood of exploitation remains low, the potential impact—local file read, possibly leading to remote code execution—justifies prompt remediation.

Generated by OpenCVE AI on April 16, 2026 at 04:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Edifice theme to the latest version that removes the vulnerable include logic (at least 1.9 or later).
  • If an update is not yet available or cannot be applied, manually modify the theme files to remove or secure the include/require statements that accept user‑controlled filenames, for example by validating the path against an allow‑list.
  • Harden the WordPress installation by disabling PHP remote file inclusion (set allow_url_fopen to Off) and ensuring that web‑accessible directories are not readable by the web user, limiting exposure if LFI is exploited.

Generated by OpenCVE AI on April 16, 2026 at 04:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex edifice
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex edifice
Wordpress
Wordpress wordpress

Fri, 06 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edifice edifice allows PHP Local File Inclusion.This issue affects Edifice: from n/a through <= 1.8.
Title WordPress Edifice theme <= 1.8 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Edifice
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:28.102Z

Reserved: 2026-02-25T12:13:25.489Z

Link: CVE-2026-28033

cve-icon Vulnrichment

Updated: 2026-03-06T12:26:31.569Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:36.060

Modified: 2026-03-06T13:16:03.753

Link: CVE-2026-28033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:00:09Z

Weaknesses