CVE-2025-26916
Published: 10 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-26916 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion (CWE-98), affecting the Pixflow Massive Dynamic WordPress theme (massive-dynamic). This issue impacts all versions from n/a through 8.2 inclusive.
Unauthenticated attackers (PR:N) can exploit the vulnerability over the network (AV:N) with high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation achieves high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) with a changed scope (S:C), resulting in a CVSS v3.1 base score of 9.0.
Mitigation details are available in advisories such as the Patchstack database entry for the WordPress Massive Dynamic theme vulnerability: https://patchstack.com/database/Wordpress/Theme/massive-dynamic/vulnerability/wordpress-massive-dynamic-theme-8-2-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
This is an unauthenticated remote/local file inclusion vulnerability in a public-facing WordPress theme that enables arbitrary code execution on the server.