CVE-2026-28118
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Welldone welldone allows PHP Local File Inclusion.This issue affects Welldone: from n/a through <= 2.4.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates PHP Local File Inclusion by requiring validation of filenames used in include/require statements to block arbitrary local file access.
Requires timely identification, reporting, and patching of the specific flaw in the Welldone WordPress theme up to version 2.4.
Supports scanning WordPress themes for known vulnerabilities like CVE-2026-28118 to enable proactive remediation.
Security SummaryAI
CVE-2026-28118 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as a PHP Local File Inclusion (LFI) issue (CWE-98), in the Welldone WordPress theme by axiomthemes. The flaw stems from inadequate validation in PHP include/require statements, affecting all versions of the Welldone theme up to and including 2.4. Published on 2026-03-05, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated remote attackers can exploit this vulnerability over the network without user interaction, though it requires high attack complexity. Exploitation enables attackers to include arbitrary local files, potentially leading to high impacts on confidentiality, integrity, and availability, such as unauthorized access to sensitive data or server compromise.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/welldone/vulnerability/wordpress-welldone-theme-2-4-local-file-inclusion-vulnerability?_s_id=cve provides details on the vulnerability in the Welldone theme version 2.4 and guidance for mitigation, which security practitioners should review for patching recommendations.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a public-facing WordPress theme flaw (LFI leading to RCE) exploitable remotely by unauthenticated attackers, directly mapping to exploitation of public-facing applications.