CVE-2026-28015
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX ShiftCV shift-cv allows PHP Local File Inclusion.This issue affects ShiftCV: from n/a through <= 3.0.14.
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching directly fixes the PHP Local File Inclusion vulnerability in the vulnerable ShiftCV WordPress theme versions up to 3.0.14.
Information input validation enforces proper checking of filenames used in PHP include/require statements, directly preventing the improper control exploited by this LFI vulnerability.
Vulnerability scanning identifies the presence of the exploitable ShiftCV theme version, enabling remediation before attack.
Security SummaryAI
CVE-2026-28015 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (CWE-98), affecting the ThemeREX ShiftCV WordPress theme in versions from n/a through 3.0.14. Published on 2026-03-05, it carries a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to significant impacts on confidentiality, integrity, and availability.
Unauthenticated attackers can exploit this vulnerability remotely over the network with high attack complexity and no user interaction required. Successful exploitation allows high-impact compromise, including potential unauthorized access to local files, code execution, and disruption of system availability.
The Patchstack advisory provides details on this Local File Inclusion vulnerability in the ShiftCV WordPress theme version 3.0.14 and recommends mitigation through available patches or updates.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2026-28015 is a local file inclusion vulnerability in a public-facing WordPress theme, allowing unauthenticated remote attackers to read arbitrary files or potentially execute code, directly enabling exploitation of a public-facing application.