CVE-2026-27339
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Buzz Stone | Magazine & Viral Blog WordPress Theme buzzstone allows PHP Local File Inclusion.This issue affects Buzz Stone | Magazine & Viral…
more
Blog WordPress Theme: from n/a through <= 1.0.2.
Mitigating Controls (NIST 800-53 r5)AI
Requires timely patching and remediation of the specific PHP file inclusion flaw in the Buzz Stone WordPress theme to eliminate CVE-2026-27339.
Mandates validation of untrusted filename inputs to PHP include/require statements, directly preventing local file inclusion exploitation.
Enforces secure PHP configuration settings like open_basedir restrictions to limit file access paths and block unauthorized inclusions.
Security SummaryAI
CVE-2026-27339 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and described as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion. It affects the Buzz Stone | Magazine & Viral Blog WordPress Theme (buzzstone) developed by AncoraThemes, impacting all versions from n/a through 1.0.2. The vulnerability was published on 2026-03-05 with a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote unauthenticated attackers can exploit this vulnerability over the network, requiring high attack complexity but no user interaction or privileges. Successful exploitation allows attackers to perform local file inclusion of PHP files, potentially resulting in high-impact confidentiality breaches through sensitive data exposure, integrity violations via arbitrary code execution, and availability disruptions.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/buzzstone/vulnerability/wordpress-buzz-stone-magazine-viral-blog-wordpress-theme-theme-1-0-2-local-file-inclusion-vulnerability?_s_id=cve details the vulnerability in the buzzstone WordPress theme.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote file inclusion (RFI/LFI) in a public-facing WordPress theme, directly enabling exploitation of a public-facing web application.