Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes smart SEO smartSEO allows PHP Local File Inclusion.This issue affects smart SEO: from n/a through <= 2.9.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion enabling potential remote code execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability in Axiomthemes SmartSEO theme arises from improper control of the filename used in PHP include/require calls. This flaw allows an attacker to force the theme to load arbitrary files from the server, potentially revealing sensitive configuration files or, when combined with additional exploitation techniques, executing malicious code on the host. While the described issue is a local file inclusion (LFI), the nature of the include statement means that an attacker who can influence the target parameter may gain unintended access to files that are otherwise protected, compromising confidentiality and integrity of the system.

Affected Systems

The SmartSEO WordPress theme provided by Axiomthemes is affected in all releases up to and including version 2.9. No affected versions beyond 2.9 are listed, indicating that updates later than 2.9 may have mitigated this flaw.

Risk and Exploitability

The CVSS score of 8.1 classifies this flaw as high severity. The EPSS score of less than 1% suggests that exploitation is currently rare, and the vulnerability is not listed in CISA’s KEV catalog. However, the likely attack vector is a crafted HTTP request that supplies an uncontrolled file path to the theme’s inclusion logic. If an attacker can manipulate this path, they may read arbitrary files or trigger malicious code execution. Consequently, while the immediate risk may be low due to low exploitation probability, the potential impact remains significant.

Generated by OpenCVE AI on April 16, 2026 at 04:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update SmartSEO to the latest version available from Axiomthemes; versions above 2.9 reportedly remove the LFI vector.
  • If an update is not immediately possible, sanitize user-supplied include parameters by validating them against an allow‑list of known safe paths or by removing directory traversal characters such as ".." or slashes from the input before it is passed to include/require.
  • Configure the web server or PHP runtime to restrict file include paths (e.g., adjust the include_path directive) so that only the intended theme directory can be referenced, thereby blocking arbitrary file access.

Generated by OpenCVE AI on April 16, 2026 at 04:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Axiomthemes
Axiomthemes smart Seo
Wordpress
Wordpress wordpress
Vendors & Products Axiomthemes
Axiomthemes smart Seo
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes smart SEO smartSEO allows PHP Local File Inclusion.This issue affects smart SEO: from n/a through <= 2.9.
Title WordPress smart SEO theme <= 2.9 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Axiomthemes Smart Seo
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:46.472Z

Reserved: 2026-02-25T12:14:07.578Z

Link: CVE-2026-28117

cve-icon Vulnrichment

Updated: 2026-03-05T15:30:31.841Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:46.220

Modified: 2026-03-05T19:38:33.877

Link: CVE-2026-28117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:00:09Z

Weaknesses