CVE-2026-28024
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Helion helion allows PHP Local File Inclusion.This issue affects Helion: from n/a through <= 1.1.12.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper filename control in PHP include/require by enforcing input validation to reject malicious local file paths.
Requires timely identification and patching of the specific flaw in Helion WordPress theme versions through 1.1.12 to eliminate the LFI vulnerability.
Mandates vulnerability scanning to detect and report this CVE in deployed WordPress themes for prompt remediation.
Security SummaryAI
CVE-2026-28024 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the Helion WordPress theme developed by axiomthemes. This issue affects Helion versions from n/a through 1.1.12. The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, and is associated with CWE-98.
Unauthenticated attackers can exploit this vulnerability remotely over the network without user interaction, though it requires high attack complexity. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling attackers to include and execute local PHP files on the server.
The Patchstack advisory provides further details on this Local File Inclusion vulnerability in WordPress Helion theme version 1.1.12, accessible at https://patchstack.com/database/Wordpress/Theme/helion/vulnerability/wordpress-helion-theme-1-1-12-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables remote exploitation of a public-facing application for arbitrary local file inclusion, PHP execution, and sensitive data disclosure.