Cyber Posture

CVE-2026-28026

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Motorix motorix allows PHP Local File Inclusion.This issue affects Motorix: from n/a through <= 1.6.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring identification, reporting, and correction of the flaw in the Motorix theme's improper filename control for PHP include/require statements.

prevent

Requires validation of information inputs like user-supplied filenames to block path traversal attempts enabling local file inclusion.

prevent

Enforces secure configuration settings in PHP, such as open_basedir restrictions, to limit arbitrary local file access even if input validation fails.

Security SummaryAI

CVE-2026-28026 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion, within the ThemeREX Motorix WordPress theme. It enables PHP Local File Inclusion and affects all versions of Motorix from n/a through 1.6.

The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation over the network by unauthenticated attackers with no user interaction required, though high attack complexity is necessary. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to read or execute arbitrary local files on the server.

Patchstack's advisory documents this Local File Inclusion issue specifically in Motorix theme version 1.6, providing details on the WordPress theme vulnerability at https://patchstack.com/database/Wordpress/Theme/motorix/vulnerability/wordpress-motorix-theme-1-6-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated remote local file inclusion (LFI) flaw in a public-facing WordPress theme, directly enabling exploitation of a public-facing application for unauthorized file access, data disclosure, and potential code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References