Cyber Posture

CVE-2026-28021

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Craftis craftis allows PHP Local File Inclusion.This issue affects Craftis: from n/a through <= 1.2.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-28021 by identifying, reporting, and correcting the LFI flaw in the Craftis WordPress theme through timely patching.

prevent

Implements input validation at points where filenames are supplied for PHP include/require statements, preventing improper control leading to local file inclusion.

detect

Monitors and scans for vulnerabilities like CVE-2026-28021 in WordPress themes, identifying the affected Craftis versions for remediation.

Security SummaryAI

CVE-2026-28021 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as a PHP Local File Inclusion (LFI) issue, in the ThemeREX Craftis WordPress theme. This flaw affects Craftis versions from n/a through 1.2.8, stemming from CWE-98. Published on 2026-03-05, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to significant impacts on confidentiality, integrity, and availability.

Unauthenticated attackers can exploit this over the network with high attack complexity and no user interaction. Exploitation enables local file inclusion, allowing remote adversaries to include and potentially execute arbitrary local PHP files on the server, leading to high-impact outcomes such as data disclosure, modification, or denial of service.

The Patchstack advisory documents this Local File Inclusion vulnerability specifically in WordPress Craftis theme version 1.2.8, with details available at https://patchstack.com/database/Wordpress/Theme/craftis/vulnerability/wordpress-craftis-theme-1-2-8-local-file-inclusion-vulnerability?_s_id=cve. Security practitioners should review this reference for recommended mitigation steps.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

LFI vulnerability in public-facing WordPress theme enables remote exploitation of public-facing application (T1190) and facilitates reading local files for data from local system (T1005), file and directory discovery (T1083), and unsecured credentials in files (T1552.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References