CVE-2026-25380
Published: 25 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes Feedy feedy allows PHP Local File Inclusion.This issue affects Feedy: from n/a through < 2.1.5.
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely remediation of flaws, directly mitigating this CVE by updating the Feedy WordPress theme to version 2.1.5 or later where the vulnerability is patched.
SI-10 mandates validation of information inputs, preventing attackers from injecting malicious filenames into PHP include/require statements exploited in this local file inclusion vulnerability.
CM-6 enforces secure configuration settings for PHP, such as disabling allow_url_include or setting open_basedir, to restrict arbitrary file inclusion attempts.
Security SummaryAI
CVE-2026-25380, published on 2026-03-25, is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability (CWE-98), described as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Feedy WordPress theme developed by jwsthemes, impacting all versions from n/a through those prior to 2.1.5.
The vulnerability carries a CVSS v3.1 base score of 8.1 (High), characterized by a network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U), with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Remote attackers without authentication can exploit it over the network, potentially gaining unauthorized access to local files through improper filename controls in PHP include/require statements.
The Patchstack advisory details the local file inclusion vulnerability in the Feedy WordPress theme and indicates it is addressed in version 2.1.5, recommending that users update to this or later versions for mitigation.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a Local File Inclusion (LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing application for unauthorized access or server-side file execution.