CVE-2026-28025
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Stargaze stargaze allows PHP Local File Inclusion.This issue affects Stargaze: from n/a through <= 1.5.
Analysis
ThemeREX Stargaze versions 1.5 and earlier contain a PHP local file inclusion vulnerability that allows unauthenticated remote attackers to read arbitrary files on affected servers. The vulnerability stems from improper validation of file inclusion parameters in PHP programs, enabling attackers to manipulate include/require statements to access sensitive data. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all instances of ThemeREX Stargaze theme in use and document version numbers; implement WAF rules to block suspicious file inclusion patterns targeting the vulnerable endpoints. Within 7 days: Disable or deactivate the Stargaze theme if business-critical; prepare communication with affected stakeholders. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today