Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edge Decor edge-decor allows PHP Local File Inclusion.This issue affects Edge Decor: from n/a through <= 2.2.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion with potential remote code execution
Action: Apply Patch
AI Analysis

Impact

The Edge Decor theme for WordPress contains an improper handling of filenames in PHP include and require statements, allowing attackers to specify arbitrary local file paths. This flaw can let a malicious user read sensitive files or, if PHP source code or configuration files are included, execute code on the server, leading to data disclosure, tampering, or full system compromise.

Affected Systems

Any WordPress installation using the ThemeREX Edge Decor theme version 2.2 or earlier is affected. The issue is limited to the theme’s core files and does not extend to other plugins or the WordPress core itself.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.1, indicating high severity, while the EPSS score of less than 1% suggests a relatively low current exploitation likelihood. It is not listed in the CISA KEV catalog. Attackers would need to trigger the vulnerable include logic, likely through crafted URLs or input fields that pass a filename to the theme’s PHP scripts. Once the include succeeds, the attacker may gain the ability to read arbitrary files or execute arbitrary PHP code on the web server.

Generated by OpenCVE AI on April 15, 2026 at 23:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a securely patched version of the Edge Decor theme or replace it with an alternative
  • Configure PHP to enforce safe file inclusion: set open_basedir to restrict file access, disable allow_url_include, and use PHP’s realpath() checks before including
  • Restrict web access to the theme’s internal files by adding appropriate .htaccess or web server rules to block direct requests to /wp-content/themes/edge-decor files

Generated by OpenCVE AI on April 15, 2026 at 23:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex edge Decor
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex edge Decor
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edge Decor edge-decor allows PHP Local File Inclusion.This issue affects Edge Decor: from n/a through <= 2.2.
Title WordPress Edge Decor theme <= 2.2 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Edge Decor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:36.384Z

Reserved: 2026-02-25T12:13:39.590Z

Link: CVE-2026-28064

cve-icon Vulnrichment

Updated: 2026-03-05T20:59:32.333Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:40.210

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-28064

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:15:17Z

Weaknesses