Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in magentech FlashMart flashmart allows PHP Local File Inclusion.This issue affects FlashMart: from n/a through <= 2.0.15.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Immediate Patch
AI Analysis

Impact

The FlashMart WordPress theme contains an improper control of the filename used in PHP include/require statements, a flaw classified as CWE‑98. This vulnerability allows an attacker to request that the application include arbitrary local files. If the attacker can force the inclusion of PHP files or files that can be executed, the impact could range from disclosure of sensitive configuration files to remote code execution. The upper‑layer operating system and application files become read‑or‑executed accessible, thereby compromising confidentiality, integrity, or availability of the affected site.

Affected Systems

The vulnerability affects all releases of the FlashMart theme from the first known version up to and including version 2.0.15. No higher releases of the FlashMart theme are listed as affected.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score of less than 1% suggests that, at the moment of this analysis, the likelihood of the vulnerability being exploited is very low. It is not listed in the CISA KEV catalog. The attack vector is inferred to be via crafted input to the theme’s PHP code that determines the file path for an include/require statement, possibly through a URL parameter or form field. Successful exploitation would require that the attacker can influence the string supplied to the include/require call and that the target application runs with a web server user that has read access to the targeted files.

Generated by OpenCVE AI on April 15, 2026 at 23:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the FlashMart theme to a version newer than 2.0.15, if one is available from the vendor.
  • If an update is not available, restrict web access to the theme’s include directory by configuring the web server or using .htaccess rules to deny file access outside the intended directory structure.
  • Implement input validation on any dynamic include/require parameters so that only whitelisted file names are accepted, effectively eliminating the path traversal vector.

Generated by OpenCVE AI on April 15, 2026 at 23:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Magentech
Magentech flashmart
Wordpress
Wordpress wordpress
Vendors & Products Magentech
Magentech flashmart
Wordpress
Wordpress wordpress

Fri, 06 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in magentech FlashMart flashmart allows PHP Local File Inclusion.This issue affects FlashMart: from n/a through <= 2.0.15.
Title WordPress FlashMart theme <= 2.0.15 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Magentech Flashmart
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:31.787Z

Reserved: 2026-02-25T12:13:30.134Z

Link: CVE-2026-28048

cve-icon Vulnrichment

Updated: 2026-03-06T14:56:29.349Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:37.867

Modified: 2026-03-06T15:16:10.500

Link: CVE-2026-28048

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:15:17Z

Weaknesses