Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Muzicon muzicon allows PHP Local File Inclusion.This issue affects Muzicon: from n/a through <= 1.9.0.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Update Theme
AI Analysis

Impact

The vulnerability arises from improper control of the filename used in PHP include/require statements, allowing a malicious actor to supply a crafted path that causes the Muzicon theme to include arbitrary local files. This can expose sensitive configuration files, credentials, or other data and may serve as a foothold for further attacks such as local code execution. Based on the description, it is inferred that the inclusion path might be influenced by user input or URL parameters, even though the exact mechanism is not detailed in the data.

Affected Systems

ThemeREX Muzicon theme versions up to and including 1.9.0 are affected. No later versions are listed, so any installation running the theme at or below this version is vulnerable.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score of less than 1 % suggests that exploitation is currently unlikely to be widespread. The vulnerability is not listed in the CISA KEV catalog, which further indicates a low probability of active exploitation. Based on the description, it is inferred that the attack vector may involve injection of special characters or crafted paths through query strings, form fields, or other user‑controlled inputs, making the threat moderate but potentially serious if the attacker can access arbitrary files or trigger further code execution.

Generated by OpenCVE AI on April 16, 2026 at 12:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Muzicon theme to the latest released version that patches the LFI defect.
  • If a newer version is unavailable, deactivate or replace the Muzicon theme and consider switching to an alternative theme.
  • As a temporary safeguard, review the theme’s PHP files, replace dynamic include/require calls with a strict whitelist of allowed files or hard‑coded safe paths, and ensure the web server’s file permissions deny non‑admin users read access to sensitive configuration files.

Generated by OpenCVE AI on April 16, 2026 at 12:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex muzicon
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex muzicon
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Muzicon muzicon allows PHP Local File Inclusion.This issue affects Muzicon: from n/a through <= 1.9.0.
Title WordPress Muzicon theme <= 1.9.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Themerex Muzicon
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:43.798Z

Reserved: 2026-02-25T12:14:02.975Z

Link: CVE-2026-28107

cve-icon Vulnrichment

Updated: 2026-03-05T16:23:10.908Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:45.170

Modified: 2026-03-05T19:38:33.877

Link: CVE-2026-28107

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:45:35Z

Weaknesses