Cyber Posture

CVE-2026-25381

High

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes LoveDate lovedate allows PHP Local File Inclusion.This issue affects LoveDate: from n/a through < 3.8.6.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely patching of the LoveDate theme to version 3.8.6 directly remediates the PHP local file inclusion vulnerability.

prevent

Enforces validation of user-supplied filenames prior to use in PHP include/require statements, preventing malicious local file inclusion.

prevent

Establishes secure PHP configuration settings like allow_url_include=Off and open_basedir restrictions to mitigate arbitrary file inclusion attempts.

Security SummaryAI

CVE-2026-25381 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the LoveDate WordPress theme developed by jwsthemes. This flaw affects all versions of the LoveDate theme from n/a through those prior to 3.8.6.

Unauthenticated attackers can exploit this vulnerability remotely over the network with no user interaction required, though it demands high attack complexity. Exploitation yields high impacts on confidentiality, integrity, and availability, per the CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-98, potentially allowing inclusion and execution of arbitrary local files on the server.

The Patchstack advisory details this local file inclusion vulnerability in the WordPress LoveDate theme and indicates it is fixed in version 3.8.6.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated remote file inclusion (LFI/RFI) in a public-facing WordPress theme, directly enabling exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References