CVE-2026-28065
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Eject eject allows PHP Local File Inclusion.This issue affects Eject: from n/a through <= 2.17.
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires organizations to identify, report, and correct system flaws like the improper filename control in Eject theme's PHP include/require, directly preventing LFI exploitation through patching.
SI-10 mandates validation of all inputs, including filenames passed to PHP include/require statements, to reject malicious paths and block local file inclusion attacks.
CM-6 establishes secure configuration settings for PHP, such as open_basedir restrictions, to limit file system access and mitigate successful LFI even if primary controls fail.
Security SummaryAI
CVE-2026-28065 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as PHP Remote File Inclusion, in the ThemeREX Eject WordPress theme. The flaw enables PHP Local File Inclusion and affects Eject versions from an unspecified initial release through 2.17. It is associated with CWE-98 and carries a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
An unauthenticated attacker can exploit this vulnerability remotely over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially enabling arbitrary local file inclusion that could lead to sensitive data exposure, code execution, or system compromise on the targeted WordPress site.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/eject/vulnerability/wordpress-eject-theme-2-17-local-file-inclusion-vulnerability?_s_id=cve documents this Local File Inclusion issue specifically in Eject theme version 2.17.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme directly enables exploitation of a public-facing application (T1190) by unauthenticated remote attackers to access sensitive local files, with high CVSS impacts confirming substantial exploitation potential.