Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bassein bassein allows PHP Local File Inclusion.This issue affects Bassein: from n/a through <= 1.0.15.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Patch
AI Analysis

Impact

The WordPress Bassein theme implements PHP include and require statements that accept filenames supplied by clients without proper filtering. This flaw, identified as CWE-98, allows an attacker to cause the theme to read and include arbitrary files from the server’s filesystem. If a target of the include contains executable PHP code, the attacker can read or execute it. The CVE description specifically states that the vulnerability can lead to PHP Local File Inclusion; it does not explicitly confirm that remote code execution is always achievable, but it is inferred that execution is possible when the included file contains PHP.

Affected Systems

All WordPress sites that have installed ThemeREX Bassein version 1.0.15 or earlier are affected. The issue applies to each instance of the theme across any website that has not applied an upgrade or patch that resolves the insecure include logic.

Risk and Exploitability

The flaw carries a CVSS score of 8.1, indicating a high severity level. The EPSS score is below 1 %, suggesting a low likelihood of seeing exploitation in the wild at present, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to supply a controlled filename via an HTTP request that is then passed directly to the include/require call. Because the trigger is remote and does not depend on administrative credentials, a remote attacker can activate the flaw. While the description allows inference that arbitrary PHP code could be executed, the guarantee of remote code execution is not stated explicitly.

Generated by OpenCVE AI on April 16, 2026 at 04:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ThemeREX Bassein to version 1.0.16 or later, which removes the insecure filename handling in the include logic.
  • If an upgrade is not immediately possible, restrict the directories from which the theme can include files, for example by adding an .htaccess rule or web‑server configuration that denies execution of PHP files outside the theme’s base folder.
  • Apply input validation or a whitelist for filenames that the theme accepts in include/require calls, ensuring that only expected files can be referenced.

Generated by OpenCVE AI on April 16, 2026 at 04:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex bassein
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex bassein
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bassein bassein allows PHP Local File Inclusion.This issue affects Bassein: from n/a through <= 1.0.15.
Title WordPress Bassein theme <= 1.0.15 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Bassein
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:36.872Z

Reserved: 2026-02-25T12:13:39.590Z

Link: CVE-2026-28067

cve-icon Vulnrichment

Updated: 2026-03-05T19:10:05.785Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:40.620

Modified: 2026-03-05T20:16:14.120

Link: CVE-2026-28067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:00:09Z

Weaknesses