Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in UnTheme OrganicFood organicfood allows PHP Local File Inclusion.This issue affects OrganicFood: from n/a through <= 3.6.4.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Immediate Patch
AI Analysis

Impact

Improper control of filenames used in PHP include and require statements within the UnTheme OrganicFood WordPress theme creates a local file inclusion flaw. This vulnerability can allow an attacker to read or execute arbitrary files on the server’s filesystem. The potential impact includes unauthorized disclosure of sensitive data or execution of malicious code, thereby compromising the confidentiality, integrity, or availability of the affected WordPress site.

Affected Systems

All installations of the UnTheme OrganicFood WordPress theme version 3.6.4 or earlier are impacted. Any WordPress site that has deployed this theme from its earliest release through 3.6.4 remains vulnerable.

Risk and Exploitability

The CVSS score of 7.5 classifies the flaw as high severity, while the EPSS score below 1% indicates a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a crafted HTTP request that manipulates the theme’s file inclusion logic to reference local filesystem paths, a scenario that an attacker would initiate by providing a malicious file path parameter in a request.

Generated by OpenCVE AI on April 9, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the OrganicFood WordPress theme to version 3.6.5 or later via the WordPress admin dashboard or the vendor’s website. If an immediate upgrade is not possible, refrain from using the vulnerable include functionality, for example by removing or disabling the related PHP file within the theme directory.

Generated by OpenCVE AI on April 9, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Untheme
Untheme organicfood
Wordpress
Wordpress wordpress
Vendors & Products Untheme
Untheme organicfood
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in UnTheme OrganicFood organicfood allows PHP Local File Inclusion.This issue affects OrganicFood: from n/a through <= 3.6.4.
Title WordPress OrganicFood theme <= 3.6.4 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Untheme Organicfood
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:03.980Z

Reserved: 2026-04-07T10:58:10.483Z

Link: CVE-2026-39684

cve-icon Vulnrichment

Updated: 2026-04-09T14:59:47.308Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:40.273

Modified: 2026-04-24T18:05:35.730

Link: CVE-2026-39684

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:40:36Z

Weaknesses