CVE-2026-27994
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Tediss tediss allows PHP Local File Inclusion.This issue affects Tediss: from n/a through <= 1.2.4.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely identification, reporting, and patching of the vulnerable PHP include/require flaw in the Tediss WordPress theme.
Prevents exploitation of the improper filename control by enforcing validation of user-supplied inputs used in PHP include/require statements to block malicious local file paths.
Mitigates the vulnerability through secure configuration settings for PHP, such as open_basedir restrictions and disabling dangerous functions like allow_url_include.
Security SummaryAI
CVE-2026-27994 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), affecting the ThemeREX Tediss WordPress theme in versions from n/a through 1.2.4.
The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation is possible by unauthenticated attackers over the network. It requires high attack complexity with no user interaction, allowing successful exploits to result in high impacts on confidentiality, integrity, and availability.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/tediss/vulnerability/wordpress-tediss-theme-1-2-4-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an LFI in a public-facing WordPress theme, directly enabling exploitation of a public-facing application.