Cyber Posture

CVE-2026-28055

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX M.Williamson williamson allows PHP Local File Inclusion.This issue affects M.Williamson: from n/a through <= 1.2.11.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating the specific flaw in the M.Williamson WordPress theme versions <=1.2.11 directly prevents exploitation of this PHP local file inclusion vulnerability.

prevent

Validating filenames supplied to PHP include/require statements blocks malicious path traversal or inclusion attempts central to this CVE.

prevent

Securing PHP configuration settings such as open_basedir and allow_url_include=Off limits the impact of improper filename controls in the vulnerable theme.

Security SummaryAI

CVE-2026-28055 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the ThemeREX M.Williamson WordPress theme (also referred to as williamson). This issue affects all versions of M.Williamson up to and including 1.2.11. The vulnerability was published on 2026-03-05 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-98.

An unauthenticated attacker with network access can exploit this vulnerability remotely. Exploitation requires high attack complexity but no privileges or user interaction, allowing the attacker to achieve high impacts on confidentiality, integrity, and availability, such as local file disclosure or potential code execution via included files.

The Patchstack advisory provides details on mitigation for this WordPress theme vulnerability: https://patchstack.com/database/Wordpress/Theme/williamson/vulnerability/wordpress-m-williamson-theme-1-2-11-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

LFI vulnerability in public-facing WordPress theme enables T1190 (exploit public-facing application) for initial access and T1005 (data from local system) via arbitrary local file inclusion, with high C/I/A impacts indicating direct facilitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References