Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Artrium artrium allows PHP Local File Inclusion.This issue affects Artrium: from n/a through <= 1.0.14.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion leading to potential confidentiality and integrity compromise
Action: Patch Now
AI Analysis

Impact

The Artrium WordPress theme contains an improper control of filename for include/require statements, allowing an attacker to force inclusion of arbitrary local files. This can expose sensitive configuration, user data, or, if the included content is executable PHP, enable remote code execution, potentially leading to full site compromise. The weakness is categorized as CWE‑98.

Affected Systems

WordPress sites that employ the ThemeREX Artrium theme version 1.0.14 or earlier are affected. All installations of the theme up to and including 1.0.14 contain the vulnerable code; later versions are not impacted.

Risk and Exploitability

The CVSS score of 8.1 places this issue in the high severity range, while the EPSS score of less than 1% indicates a low likelihood of exploitation at present. This vulnerability is not listed in the CISA Key Exploited Vulnerabilities catalog. Likely exploitation involves manipulating a request parameter that feeds a filename into the theme’s include/require logic; no explicit authentication requirement is stated, suggesting that publicly accessible endpoints may be vulnerable.

Generated by OpenCVE AI on April 16, 2026 at 04:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Artrium theme to the newest available release to remove the vulnerable code
  • If an update cannot be applied immediately, modify the theme’s inclusion logic to whitelist permitted filenames and reject any requests that specify non‑whitelisted files
  • Implement server‑side controls, such as disabling file inclusion via PHP directives or restricting access to critical directories with .htaccess or equivalent

Generated by OpenCVE AI on April 16, 2026 at 04:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex artrium
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex artrium
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Artrium artrium allows PHP Local File Inclusion.This issue affects Artrium: from n/a through <= 1.0.14.
Title WordPress Artrium theme <= 1.0.14 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Artrium
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:42.032Z

Reserved: 2026-02-25T12:13:56.812Z

Link: CVE-2026-28097

cve-icon Vulnrichment

Updated: 2026-03-05T18:38:12.943Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:43.970

Modified: 2026-03-05T19:38:33.877

Link: CVE-2026-28097

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:00:09Z

Weaknesses