CVE-2026-25457
Published: 25 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Mixtape mixtape allows PHP Local File Inclusion.This issue affects Mixtape: from n/a through <= 2.1.
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific LFI flaw in Mixtape theme versions <=2.1 to prevent exploitation.
Mandates validation of filenames used in PHP include/require statements to block arbitrary local file inclusion attacks.
Enables scanning for the known vulnerability in the Mixtape WordPress theme to identify affected systems.
Security SummaryAI
CVE-2026-25457 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Select-Themes Mixtape WordPress theme. This issue affects Mixtape versions from n/a through 2.1. The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, and is associated with CWE-98.
Unauthenticated attackers can exploit this vulnerability remotely over the network, though it requires high attack complexity and no user interaction. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, allowing attackers to include arbitrary local files, potentially leading to sensitive data exposure, arbitrary code execution, or system compromise on affected WordPress installations running the vulnerable theme.
The Patchstack advisory provides further details on this vulnerability in the Mixtape WordPress theme version 2.1, available at https://patchstack.com/database/Wordpress/Theme/mixtape/vulnerability/wordpress-mixtape-theme-2-1-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables remote unauthenticated exploitation of a web application.