CVE-2026-28028
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX MoneyFlow moneyflow allows PHP Local File Inclusion.This issue affects MoneyFlow: from n/a through <= 1.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the PHP local file inclusion flaw in the MoneyFlow WordPress theme through timely patching or updates as documented in Patchstack advisories.
Requires validation and sanitization of user-supplied filenames in PHP include/require statements to block path traversal and local file inclusion exploitation.
Enforces secure configuration settings for PHP such as disabling allow_url_include and restricting open_basedir to limit the impact of improper filename controls.
Security SummaryAI
CVE-2026-28028 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the ThemeREX MoneyFlow WordPress theme. This flaw affects all versions of MoneyFlow up to and including 1.0. Mapped to CWE-98, it stems from inadequate sanitization of filenames used in PHP include/require statements, allowing attackers to manipulate file paths.
The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation over the network by unauthenticated attackers (PR:N) with no user interaction required (UI:N), though it demands high attack complexity (AC:H). Successful exploitation could grant high-impact confidentiality, integrity, and availability consequences, potentially enabling attackers to include and execute arbitrary local files on the server, leading to sensitive data exposure, server-side code execution, or full system compromise depending on server configuration and accessible files.
Patchstack advisories document this local file inclusion vulnerability in the WordPress MoneyFlow theme version 1.0, providing details on the issue via their database entry. Practitioners should consult the referenced advisory at https://patchstack.com/database/Wordpress/Theme/moneyflow/vulnerability/wordpress-moneyflow-theme-1-0-local-file-inclusion-vulnerability?_s_id=cve for specific patch availability, workaround guidance, or theme updates to mitigate exposure.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables T1190 (exploit public-facing app). Allows arbitrary local file inclusion/execution, directly facilitating T1005 (data from local system), T1083 (file/directory discovery), and T1552.001 (credentials in files like wp-config.php).