CVE-2026-28033
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edifice edifice allows PHP Local File Inclusion.This issue affects Edifice: from n/a through <= 1.8.
Analysis
ThemeREX Edifice through version 1.8 contains a local file inclusion vulnerability in PHP that enables unauthenticated remote attackers to read arbitrary files from the affected server. The vulnerability stems from improper validation of file paths in include/require statements, allowing attackers to traverse the filesystem and access sensitive data. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all instances of Edifice theme in use and disable the affected plugin/theme if not immediately needed; document business justification for any systems that must remain active. Within 7 days: Contact ThemeREX for patch availability and timeline; implement Web Application Firewall (WAF) rules to block malicious file inclusion patterns (e.g., filtering PHP wrappers and directory traversal sequences). …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today