Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Gamezone gamezone allows PHP Local File Inclusion.This issue affects Gamezone: from n/a through <= 1.1.11.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local file inclusion leading to potential server compromise
Action: Patch
AI Analysis

Impact

An improper control of filenames in the WordPress Gamezone theme causes PHP to include and require files without adequate sanitization. This flaw permits attackers to trigger local file inclusion, allowing them to retrieve arbitrary files on the server or, in some circumstances, execute code. If an attacker can supply a path that points to a PHP file, the included content will run with the same privileges as the WordPress process, potentially granting full control over the compromised site.

Affected Systems

WordPress sites that are running ThemeREX Gamezone version 1.1.11 or earlier are affected. The vulnerability resides within the theme’s file inclusion logic and therefore only impacts installations that have the Gamezone theme active.

Risk and Exploitability

With a CVSS score of 8.1 the risk is high, yet the EPSS score of less than 1 % indicates that no widespread exploitation is currently observed. The flaw requires the attacker to interact with the site’s HTTP interface, delivering a crafted request that triggers the vulnerable include. Because it is a local file inclusion, successful exploitation depends on the presence of readable files or writable directories that can contain malicious PHP code. The risk to confidentiality, integrity, and availability is significant if an attacker can read sensitive files or execute code, but the actual exploitation probability remains low according to current data.

Generated by OpenCVE AI on April 15, 2026 at 22:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Gamezone theme to the latest release that includes the fix
  • If an immediate upgrade is not possible, restrict the theme’s file inclusion logic by ensuring that include paths are validated against a whitelist of allowed directories
  • Secure the WordPress filesystem by setting correct file permissions and disabling allow_url_include in php.ini to prevent inclusion of remote files

Generated by OpenCVE AI on April 15, 2026 at 22:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex gamezone
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex gamezone
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Gamezone gamezone allows PHP Local File Inclusion.This issue affects Gamezone: from n/a through <= 1.1.11.
Title WordPress Gamezone theme <= 1.1.11 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Gamezone
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:40.684Z

Reserved: 2026-02-25T12:13:51.945Z

Link: CVE-2026-28090

cve-icon Vulnrichment

Updated: 2026-03-05T19:07:14.089Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:43.047

Modified: 2026-03-05T20:16:14.890

Link: CVE-2026-28090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:00:10Z

Weaknesses