Cyber Posture

CVE-2026-28058

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Dixon dixon allows PHP Local File Inclusion.This issue affects Dixon: from n/a through <= 1.4.2.1.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the specific PHP file inclusion vulnerability in the Dixon WordPress theme by requiring timely patching or updating to a non-vulnerable version.

prevent

Enforces validation of user-supplied filenames in PHP include/require statements to prevent arbitrary local file inclusion exploitation.

prevent

Establishes secure baseline configurations for PHP and web servers, such as disabling allow_url_include and enforcing open_basedir, to restrict file inclusion capabilities.

Security SummaryAI

CVE-2026-28058 is an Improper Control of Filename for Include/Require Statement vulnerability in PHP programs, specifically a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (CWE-98). It affects the ThemeREX Dixon WordPress theme, with all versions up to and including 1.4.2.1 vulnerable. The vulnerability was published on 2026-03-05 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers without privileges can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, enabling attackers to include and potentially execute arbitrary local files on the server.

Mitigation details are documented in advisories such as the Patchstack database entry for the WordPress Dixon theme vulnerability: https://patchstack.com/database/Wordpress/Theme/dixon/vulnerability/wordpress-dixon-theme-1-4-2-1-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Why these techniques?

LFI vulnerability in public-facing WordPress theme enables unauthenticated remote exploitation of public-facing application (T1190) and arbitrary local file reads for file and directory discovery (T1083).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References