CVE-2026-28054
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Legal Stone legal-stone allows PHP Local File Inclusion.This issue affects Legal Stone: from n/a through <= 1.2.11.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the PHP Local File Inclusion flaw in Legal Stone theme versions <=1.2.11 by applying vendor patches or code fixes.
Validates untrusted inputs controlling PHP include/require filenames to block path traversal and arbitrary local file execution.
Deploys boundary protections like web application firewalls to inspect and block remote file inclusion payloads targeting the vulnerable theme.
Security SummaryAI
CVE-2026-28054 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion (CWE-98), in the ThemeREX Legal Stone WordPress theme. The flaw enables PHP Local File Inclusion and affects Legal Stone versions from n/a through 1.2.11. It was published on 2026-03-05 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated attackers can exploit this vulnerability remotely over the network with high attack complexity and no user interaction required. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to include and execute local PHP files on the server.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/legal-stone/vulnerability/wordpress-legal-stone-theme-1-2-11-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Public-facing LFI vulnerability in WordPress theme exploited remotely without authentication (T1190), directly enabling inclusion and access to arbitrary local files for data collection (T1005).