Cyber Posture

CVE-2026-28009

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX DroneX dronex allows PHP Local File Inclusion.This issue affects DroneX: from n/a through <= 1.1.12.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of known flaws like the LFI vulnerability in DroneX theme versions <=1.1.12 to prevent exploitation via improper filename control in PHP include/require.

prevent

Mandates validation of user-supplied inputs used as filenames in PHP include/require statements to block local file inclusion attacks.

prevent

Enforces secure configuration settings in PHP environments, such as open_basedir restrictions, to limit arbitrary local file access exploitable by this LFI vulnerability.

Security SummaryAI

CVE-2026-28009 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and described as enabling PHP Local File Inclusion, in the ThemeREX DroneX WordPress theme. This issue affects all versions of DroneX from n/a through 1.1.12. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact across confidentiality, integrity, and availability.

Remote, unauthenticated attackers can exploit this vulnerability over the network with high attack complexity and no user interaction required. Exploitation allows inclusion of local PHP files, potentially leading to arbitrary code execution, sensitive data disclosure, or system compromise, aligning with the high impact ratings in the CVSS vector.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/dronex/vulnerability/wordpress-dronex-theme-1-1-12-local-file-inclusion-vulnerability?_s_id=cve provides details on this Local File Inclusion vulnerability in the DroneX WordPress theme version 1.1.12.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a PHP Remote/Local File Inclusion in a public-facing WordPress theme, directly enabling exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References