Cyber Posture

CVE-2026-27992

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Meals & Wheels meals-wheels allows PHP Local File Inclusion.This issue affects Meals & Wheels: from n/a through <= 1.1.12.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates inputs to PHP include/require statements, preventing improper filename control that enables local file inclusion in the Meals & Wheels theme.

prevent

Remediates the specific PHP LFI flaw by identifying, patching, or updating the vulnerable Meals & Wheels theme versions through 1.1.12.

prevent

Enforces secure configuration settings like PHP open_basedir restrictions to limit arbitrary local file access exploited by this vulnerability.

Security SummaryAI

CVE-2026-27992 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98, that enables PHP Local File Inclusion (LFI) in the ThemeREX Meals & Wheels WordPress theme (meals-wheels). Published on 2026-03-05, it affects all versions from n/a through 1.1.12.

Unauthenticated remote attackers (AV:N/PR:N/UI:N) can exploit this vulnerability over the network, though it requires high attack complexity (AC:H). Successful exploitation results in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), with a CVSS v3.1 base score of 8.1, potentially allowing inclusion of arbitrary local files on the server.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/meals-wheels/vulnerability/wordpress-meals-wheels-theme-1-1-12-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

T1190 for exploiting public-facing WordPress theme vulnerability; T1005 for local file inclusion enabling access to sensitive data from local system files.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References