Cyber Posture

CVE-2026-27339

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Buzz Stone | Magazine & Viral Blog WordPress Theme buzzstone allows PHP Local File Inclusion.This issue affects Buzz Stone | Magazine & Viral…

more

Blog WordPress Theme: from n/a through <= 1.0.2.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching and remediation of the specific PHP file inclusion flaw in the Buzz Stone WordPress theme to eliminate CVE-2026-27339.

prevent

Mandates validation of untrusted filename inputs to PHP include/require statements, directly preventing local file inclusion exploitation.

prevent

Enforces secure PHP configuration settings like open_basedir restrictions to limit file access paths and block unauthorized inclusions.

Security SummaryAI

CVE-2026-27339 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and described as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Buzz Stone | Magazine & Viral Blog WordPress Theme (buzzstone) developed by AncoraThemes, impacting all versions from n/a through 1.0.2. The vulnerability was published on 2026-03-05 with a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote unauthenticated attackers can exploit this vulnerability over the network, requiring high attack complexity but no user interaction or privileges. Successful exploitation allows attackers to perform local file inclusion of PHP files, potentially resulting in high-impact confidentiality breaches through sensitive data exposure, integrity violations via arbitrary code execution, and availability disruptions.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/buzzstone/vulnerability/wordpress-buzz-stone-magazine-viral-blog-wordpress-theme-theme-1-0-2-local-file-inclusion-vulnerability?_s_id=cve details the vulnerability in the buzzstone WordPress theme.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated remote file inclusion (RFI/LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing web application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References