Cyber Posture

CVE-2026-27048

High

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes The Aisle Core theaisle-core allows PHP Local File Inclusion.This issue affects The Aisle Core: from n/a through <= 2.0.5.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the PHP Local File Inclusion flaw in the WordPress plugin by identifying, patching, and deploying fixes to prevent exploitation.

prevent

Validates filename inputs to PHP include/require statements, blocking malicious paths that enable local file inclusion by unauthenticated attackers.

prevent

Restricts filename inputs at web application boundaries to whitelisted safe files only, preventing arbitrary local file access via the vulnerable plugin.

Security SummaryAI

CVE-2026-27048 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Elated-Themes The Aisle Core (theaisle-core) WordPress plugin. This issue affects all versions from n/a through 2.0.5 and is associated with CWE-98.

The vulnerability has a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation is possible by unauthenticated remote attackers over the network. It requires high attack complexity but no user interaction. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, potentially allowing attackers to include and execute local files on the server.

Patchstack's advisory at https://patchstack.com/database/Wordpress/Plugin/theaisle-core/vulnerability/wordpress-the-aisle-core-plugin-2-0-5-local-file-inclusion-vulnerability?_s_id=cve documents the local file inclusion vulnerability specifically in The Aisle Core WordPress plugin version 2.0.5.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated Local File Inclusion (LFI) in a public-facing WordPress plugin, allowing remote attackers to include and execute local files on the server, directly enabling exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References