Cyber Posture

CVE-2026-28067

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bassein bassein allows PHP Local File Inclusion.This issue affects Bassein: from n/a through <= 1.0.15.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the PHP Local File Inclusion flaw by requiring timely identification, reporting, and patching of vulnerable Bassein theme versions up to 1.0.15.

prevent

Enforces validation of untrusted filename inputs to PHP include/require statements, preventing attackers from specifying arbitrary local files.

detect

Vulnerability scanning and monitoring detects deployments of the vulnerable ThemeREX Bassein WordPress theme.

Security SummaryAI

CVE-2026-28067 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, that allows PHP Local File Inclusion in the ThemeREX Bassein WordPress theme. This issue affects Bassein versions from n/a through 1.0.15.

The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Remote attackers without authentication can exploit it to perform local file inclusion on affected WordPress sites running vulnerable Bassein theme versions.

Mitigation details are provided in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/bassein/vulnerability/wordpress-bassein-theme-1-0-15-local-file-inclusion-vulnerability?_s_id=cve, which covers the local file inclusion vulnerability in the WordPress Bassein theme up to version 1.0.15.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Public-facing WordPress theme vulnerability enabling unauthenticated remote LFI directly maps to exploitation of public-facing applications (T1190) and facilitates collection of data from local system files (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References