CVE-2026-28064
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edge Decor edge-decor allows PHP Local File Inclusion.This issue affects Edge Decor: from n/a through <= 2.2.
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and correction of flaws like this PHP LFI vulnerability in the Edge Decor WordPress theme, directly preventing exploitation via patching.
Mandates validation of information inputs such as filenames used in PHP include/require statements, directly countering the improper control that enables local file inclusion.
Establishes secure configuration settings for PHP and WordPress environments to restrict dangerous file inclusion behaviors and limit potential impact of the theme vulnerability.
Security SummaryAI
CVE-2026-28064, published on 2026-03-05, is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98). It affects the ThemeREX Edge Decor (edge-decor) WordPress theme in versions from n/a through 2.2 inclusive.
The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network by unauthenticated attackers without user interaction, though it requires high attack complexity. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, potentially allowing arbitrary code execution or full theme compromise.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/edge-decor/vulnerability/wordpress-edge-decor-theme-2-2-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2026-28064 is a remotely exploitable LFI vulnerability in a public-facing WordPress theme, enabling unauthenticated attackers to include and execute arbitrary local PHP files, directly mapping to T1190: Exploit Public-Facing Application.