CVE-2026-32531
Published: 25 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5.
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching the Kunco WordPress theme to version 1.4.5 or later directly eliminates the improper filename control vulnerability in PHP include/require statements.
Information input validation on filename parameters used in PHP include/require prevents attackers from injecting malicious paths leading to local file inclusion.
Establishing secure configuration settings for PHP, such as disabling allow_url_include and enforcing open_basedir restrictions, mitigates exploitation of file inclusion flaws.
Security SummaryAI
CVE-2026-32531 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, though it enables PHP Local File Inclusion in the gavias Kunco WordPress theme. This flaw affects Kunco versions from n/a through those prior to 1.4.5. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.
Unauthenticated attackers on the network can exploit this vulnerability remotely, though it requires high attack complexity and no user interaction. Successful exploitation allows local file inclusion, enabling attackers to read sensitive local files or potentially execute arbitrary code if they can manipulate includes to access executable PHP files, resulting in high-impact compromise of the affected WordPress site.
The Patchstack advisory for the Kunco WordPress theme confirms the local file inclusion vulnerability and states that it was addressed in version 1.4.5, recommending immediate updates to patched versions for mitigation.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a public-facing LFI in a WordPress theme (T1190), directly enabling arbitrary local file reads (T1005).