CVE-2026-25381
Published: 25 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes LoveDate lovedate allows PHP Local File Inclusion.This issue affects LoveDate: from n/a through < 3.8.6.
Mitigating Controls (NIST 800-53 r5)AI
Timely patching of the LoveDate theme to version 3.8.6 directly remediates the PHP local file inclusion vulnerability.
Enforces validation of user-supplied filenames prior to use in PHP include/require statements, preventing malicious local file inclusion.
Establishes secure PHP configuration settings like allow_url_include=Off and open_basedir restrictions to mitigate arbitrary file inclusion attempts.
Security SummaryAI
CVE-2026-25381 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the LoveDate WordPress theme developed by jwsthemes. This flaw affects all versions of the LoveDate theme from n/a through those prior to 3.8.6.
Unauthenticated attackers can exploit this vulnerability remotely over the network with no user interaction required, though it demands high attack complexity. Exploitation yields high impacts on confidentiality, integrity, and availability, per the CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-98, potentially allowing inclusion and execution of arbitrary local files on the server.
The Patchstack advisory details this local file inclusion vulnerability in the WordPress LoveDate theme and indicates it is fixed in version 3.8.6.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote file inclusion (LFI/RFI) in a public-facing WordPress theme, directly enabling exploitation of public-facing applications.