CVE-2026-32504
Published: 25 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CreativeWS VintWood vintwood allows PHP Local File Inclusion.This issue affects VintWood: from n/a through <= 1.1.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the improper filename control in PHP include/require by requiring validation of user inputs to block malicious local file inclusion paths.
Addresses the specific flaw in VintWood WordPress theme versions <=1.1.8 through timely flaw remediation and patching.
Enforces secure PHP configuration settings like open_basedir and disabled functions to restrict the scope of potential file inclusions.
Security SummaryAI
CVE-2026-32504 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the CreativeWS VintWood WordPress theme. This issue affects VintWood versions from n/a through 1.1.8 and is associated with CWE-98. The vulnerability was published on 2026-03-25 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially through local file inclusion to access or manipulate server files.
Mitigation details are available in the Patchstack advisory for the WordPress VintWood theme vulnerability at https://patchstack.com/database/Wordpress/Theme/vintwood/vulnerability/wordpress-vintwood-theme-1-1-8-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables unauthenticated remote exploitation of a public-facing application.