Cyber Posture

CVE-2026-28065

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Eject eject allows PHP Local File Inclusion.This issue affects Eject: from n/a through <= 2.17.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires organizations to identify, report, and correct system flaws like the improper filename control in Eject theme's PHP include/require, directly preventing LFI exploitation through patching.

prevent

SI-10 mandates validation of all inputs, including filenames passed to PHP include/require statements, to reject malicious paths and block local file inclusion attacks.

prevent

CM-6 establishes secure configuration settings for PHP, such as open_basedir restrictions, to limit file system access and mitigate successful LFI even if primary controls fail.

Security SummaryAI

CVE-2026-28065 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as PHP Remote File Inclusion, in the ThemeREX Eject WordPress theme. The flaw enables PHP Local File Inclusion and affects Eject versions from an unspecified initial release through 2.17. It is associated with CWE-98 and carries a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated attacker can exploit this vulnerability remotely over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially enabling arbitrary local file inclusion that could lead to sensitive data exposure, code execution, or system compromise on the targeted WordPress site.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/eject/vulnerability/wordpress-eject-theme-2-17-local-file-inclusion-vulnerability?_s_id=cve documents this Local File Inclusion issue specifically in Eject theme version 2.17.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

LFI vulnerability in public-facing WordPress theme directly enables exploitation of a public-facing application (T1190) by unauthenticated remote attackers to access sensitive local files, with high CVSS impacts confirming substantial exploitation potential.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References