CVE-2026-28018
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Global Logistics globallogistics allows PHP Local File Inclusion.This issue affects Global Logistics: from n/a through <= 3.20.
Analysis
ThemeREX Global Logistics versions 3.20 and earlier are vulnerable to local file inclusion through improper handling of file paths in PHP include/require statements, enabling attackers to read arbitrary files from the affected system. The vulnerability requires network access but no authentication, and an attacker could leverage this to access sensitive configuration files or application source code. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all instances of Global Logistics plugin version ≤3.20 across your WordPress infrastructure and document affected systems. Within 7 days: Implement WAF rules to block malicious file inclusion patterns, restrict plugin functionality via network segmentation, or disable the vulnerable plugin if business operations permit. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today