Cyber Posture

CVE-2026-32531

High

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through patching the Kunco WordPress theme to version 1.4.5 or later directly eliminates the improper filename control vulnerability in PHP include/require statements.

prevent

Information input validation on filename parameters used in PHP include/require prevents attackers from injecting malicious paths leading to local file inclusion.

prevent

Establishing secure configuration settings for PHP, such as disabling allow_url_include and enforcing open_basedir restrictions, mitigates exploitation of file inclusion flaws.

Security SummaryAI

CVE-2026-32531 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, though it enables PHP Local File Inclusion in the gavias Kunco WordPress theme. This flaw affects Kunco versions from n/a through those prior to 1.4.5. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.

Unauthenticated attackers on the network can exploit this vulnerability remotely, though it requires high attack complexity and no user interaction. Successful exploitation allows local file inclusion, enabling attackers to read sensitive local files or potentially execute arbitrary code if they can manipulate includes to access executable PHP files, resulting in high-impact compromise of the affected WordPress site.

The Patchstack advisory for the Kunco WordPress theme confirms the local file inclusion vulnerability and states that it was addressed in version 1.4.5, recommending immediate updates to patched versions for mitigation.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The vulnerability is a public-facing LFI in a WordPress theme (T1190), directly enabling arbitrary local file reads (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References