Cyber Posture

CVE-2026-28064

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edge Decor edge-decor allows PHP Local File Inclusion.This issue affects Edge Decor: from n/a through <= 2.2.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification, reporting, and correction of flaws like this PHP LFI vulnerability in the Edge Decor WordPress theme, directly preventing exploitation via patching.

prevent

Mandates validation of information inputs such as filenames used in PHP include/require statements, directly countering the improper control that enables local file inclusion.

prevent

Establishes secure configuration settings for PHP and WordPress environments to restrict dangerous file inclusion behaviors and limit potential impact of the theme vulnerability.

Security SummaryAI

CVE-2026-28064, published on 2026-03-05, is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98). It affects the ThemeREX Edge Decor (edge-decor) WordPress theme in versions from n/a through 2.2 inclusive.

The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network by unauthenticated attackers without user interaction, though it requires high attack complexity. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, potentially allowing arbitrary code execution or full theme compromise.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/edge-decor/vulnerability/wordpress-edge-decor-theme-2-2-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-28064 is a remotely exploitable LFI vulnerability in a public-facing WordPress theme, enabling unauthenticated attackers to include and execute arbitrary local PHP files, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References