Cyber Posture

CVE-2026-28024

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Helion helion allows PHP Local File Inclusion.This issue affects Helion: from n/a through <= 1.1.12.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses improper filename control in PHP include/require by enforcing input validation to reject malicious local file paths.

prevent

Requires timely identification and patching of the specific flaw in Helion WordPress theme versions through 1.1.12 to eliminate the LFI vulnerability.

detect

Mandates vulnerability scanning to detect and report this CVE in deployed WordPress themes for prompt remediation.

Security SummaryAI

CVE-2026-28024 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the Helion WordPress theme developed by axiomthemes. This issue affects Helion versions from n/a through 1.1.12. The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, and is associated with CWE-98.

Unauthenticated attackers can exploit this vulnerability remotely over the network without user interaction, though it requires high attack complexity. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling attackers to include and execute local PHP files on the server.

The Patchstack advisory provides further details on this Local File Inclusion vulnerability in WordPress Helion theme version 1.1.12, accessible at https://patchstack.com/database/Wordpress/Theme/helion/vulnerability/wordpress-helion-theme-1-1-12-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

LFI vulnerability in public-facing WordPress theme enables remote exploitation of a public-facing application for arbitrary local file inclusion, PHP execution, and sensitive data disclosure.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References