CVE-2026-28023
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Nuts nuts allows PHP Local File Inclusion.This issue affects Nuts: from n/a through <= 1.10.
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and correction of the specific PHP Local File Inclusion flaw in ThemeREX Nuts WordPress theme versions through 1.10.
Mandates validation of filenames supplied to PHP include/require statements to block arbitrary local file inclusion attacks.
Restricts information inputs for file inclusion operations to an approved whitelist of safe filenames and paths.
Security SummaryAI
CVE-2026-28023 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the ThemeREX Nuts WordPress theme. This issue affects Nuts versions from n/a through 1.10.
The vulnerability can be exploited by unauthenticated attackers over the network with high attack complexity, requiring no user interaction. Successful exploitation grants high impacts on confidentiality, integrity, and availability, as reflected in its CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and association with CWE-98.
The Patchstack advisory details this Local File Inclusion vulnerability in the WordPress Nuts theme version 1.10.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
This is a remote local file inclusion vulnerability in a public-facing WordPress theme, directly enabling exploitation of public-facing applications.