Cyber Posture

CVE-2026-27047

High

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Curly Core curly-core allows PHP Local File Inclusion.This issue affects Curly Core: from n/a through <= 2.1.6.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the LFI vulnerability by requiring timely patching of the flawed Curly Core plugin versions up to 2.1.6.

prevent

Enforces validation of filename inputs used in PHP include/require statements to prevent improper control leading to local file inclusion.

prevent

Secures PHP configuration settings such as open_basedir restrictions to limit file access paths exploitable by the LFI vulnerability.

Security SummaryAI

CVE-2026-27047 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), in the Mikado-Themes Curly Core WordPress plugin (curly-core). This issue affects all versions from n/a through 2.1.6, as published on 2026-03-25.

Unauthenticated attackers can exploit this vulnerability remotely over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction (UI:N) or privileges (PR:N), with no scope change (S:U). Successful exploitation yields high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), earning a CVSS 3.1 base score of 8.1.

The Patchstack advisory provides details on this Local File Inclusion vulnerability in Curly Core version 2.1.6, including mitigation guidance: https://patchstack.com/database/Wordpress/Plugin/curly-core/vulnerability/wordpress-curly-core-plugin-2-1-6-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

CVE-2026-27047 is a public-facing LFI vulnerability in a WordPress plugin (T1190: Exploit Public-Facing Application) that directly enables reading arbitrary local files on the server (T1005: Data from Local System).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References