CVE-2026-28021
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Craftis craftis allows PHP Local File Inclusion.This issue affects Craftis: from n/a through <= 1.2.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-28021 by identifying, reporting, and correcting the LFI flaw in the Craftis WordPress theme through timely patching.
Implements input validation at points where filenames are supplied for PHP include/require statements, preventing improper control leading to local file inclusion.
Monitors and scans for vulnerabilities like CVE-2026-28021 in WordPress themes, identifying the affected Craftis versions for remediation.
Security SummaryAI
CVE-2026-28021 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as a PHP Local File Inclusion (LFI) issue, in the ThemeREX Craftis WordPress theme. This flaw affects Craftis versions from n/a through 1.2.8, stemming from CWE-98. Published on 2026-03-05, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to significant impacts on confidentiality, integrity, and availability.
Unauthenticated attackers can exploit this over the network with high attack complexity and no user interaction. Exploitation enables local file inclusion, allowing remote adversaries to include and potentially execute arbitrary local PHP files on the server, leading to high-impact outcomes such as data disclosure, modification, or denial of service.
The Patchstack advisory documents this Local File Inclusion vulnerability specifically in WordPress Craftis theme version 1.2.8, with details available at https://patchstack.com/database/Wordpress/Theme/craftis/vulnerability/wordpress-craftis-theme-1-2-8-local-file-inclusion-vulnerability?_s_id=cve. Security practitioners should review this reference for recommended mitigation steps.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables remote exploitation of public-facing application (T1190) and facilitates reading local files for data from local system (T1005), file and directory discovery (T1083), and unsecured credentials in files (T1552.001).