CVE-2026-28017
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Green Thumb greenthumb allows PHP Local File Inclusion.This issue affects Green Thumb: from n/a through <= 1.1.12.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents LFI exploitation by validating and sanitizing user-supplied filenames used in PHP include/require statements within the Green Thumb theme.
Remediates the specific LFI vulnerability in Green Thumb theme versions through 1.1.12 by applying timely patches or updates.
Enforces secure configuration settings for PHP and web servers, such as disabling dangerous functions like allow_url_include, to mitigate file inclusion risks.
Security SummaryAI
CVE-2026-28017 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the ThemeREX Green Thumb (greenthumb) WordPress theme. This issue impacts versions from n/a through 1.1.12 and is associated with CWE-98.
The vulnerability has a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation over the network by an unauthenticated attacker with no user interaction required, though high attack complexity is needed. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially through local file inclusion leading to unauthorized file access or execution.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/greenthumb/vulnerability/wordpress-green-thumb-theme-1-1-12-local-file-inclusion-vulnerability?_s_id=cve details this local file inclusion vulnerability in the WordPress Green Thumb theme version 1.1.12.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an LFI in a public-facing WordPress theme, directly enabling exploitation of a public-facing application (T1190) for remote unauthenticated access to read sensitive local files or potentially execute code.