CVE-2026-27048
Published: 25 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes The Aisle Core theaisle-core allows PHP Local File Inclusion.This issue affects The Aisle Core: from n/a through <= 2.0.5.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the PHP Local File Inclusion flaw in the WordPress plugin by identifying, patching, and deploying fixes to prevent exploitation.
Validates filename inputs to PHP include/require statements, blocking malicious paths that enable local file inclusion by unauthenticated attackers.
Restricts filename inputs at web application boundaries to whitelisted safe files only, preventing arbitrary local file access via the vulnerable plugin.
Security SummaryAI
CVE-2026-27048 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Elated-Themes The Aisle Core (theaisle-core) WordPress plugin. This issue affects all versions from n/a through 2.0.5 and is associated with CWE-98.
The vulnerability has a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation is possible by unauthenticated remote attackers over the network. It requires high attack complexity but no user interaction. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, potentially allowing attackers to include and execute local files on the server.
Patchstack's advisory at https://patchstack.com/database/Wordpress/Plugin/theaisle-core/vulnerability/wordpress-the-aisle-core-plugin-2-0-5-local-file-inclusion-vulnerability?_s_id=cve documents the local file inclusion vulnerability specifically in The Aisle Core WordPress plugin version 2.0.5.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated Local File Inclusion (LFI) in a public-facing WordPress plugin, allowing remote attackers to include and execute local files on the server, directly enabling exploitation of a public-facing application.