Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Yacht Rental yacht-rental allows PHP Local File Inclusion.This issue affects Yacht Rental: from n/a through <= 2.6.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Immediate Patch
AI Analysis

Impact

The Yacht Rental theme from ThemeREX contains an improper control of filename in its PHP include/require logic, enabling local file inclusion for versions up to 2.6. An attacker can manipulate the requested filename, causing the server to include and potentially execute arbitrary local files. This can lead to disclosure of sensitive configuration files, user data, or, if a PHP file is included, remote code execution within the context of the web application. The flaw directly threatens confidentiality, and, depending on the files accessed, could also affect integrity and availability. The vulnerability is a classic example of CWE‑98, which focuses on unsafe file inclusion and path traversal issues.

Affected Systems

WordPress sites using the ThemeREX Yacht Rental theme with a version number of 2.6 or earlier are affected. No further sub‑version details are provided, so any deployment of the theme as supplied in the 2.6 release or earlier must be considered vulnerable.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity with full network exposure. The EPSS score of less than 1% suggests that while the exploitation likelihood is currently low, it is not negligible. The vulnerability is not listed in the CISA KEV catalog, but the remote nature of an HTTP request to trigger the include makes it accessible to unauthenticated users. An attacker could craft a URL with a tampered parameter to point the include to a local file such as /etc/passwd, a server configuration file, or a PHP script that may lead to code execution. Thus, systems should be treated as high risk until mitigated.

Generated by OpenCVE AI on April 15, 2026 at 23:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Yacht Rental theme to any version later than 2.6 where the inclusion logic has been fixed.
  • If an upgrade is not immediately possible, modify the theme’s source or use a filtering hook to sanitize any user‑supplied filename values before they reach the include/require statement, ensuring only whitelisted files are accepted.
  • Configure the web server or an .htaccess file to disable PHP execution in directories used for file inclusion within the theme, adding a "php_admin_flag engine off" or appropriate directives to prevent any included files from running as scripts.

Generated by OpenCVE AI on April 15, 2026 at 23:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex yacht Rental
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex yacht Rental
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Yacht Rental yacht-rental allows PHP Local File Inclusion.This issue affects Yacht Rental: from n/a through <= 2.6.
Title WordPress Yacht Rental theme <= 2.6 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Yacht Rental
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:32.331Z

Reserved: 2026-02-25T12:13:30.135Z

Link: CVE-2026-28051

cve-icon Vulnrichment

Updated: 2026-03-05T21:15:05.147Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:38.290

Modified: 2026-03-05T22:16:13.770

Link: CVE-2026-28051

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:15:17Z

Weaknesses