Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27065: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThimPress BuilderPress

0
Critical
VulnerabilityCVE-2026-27065cvecve-2026-27065cwe-98
Published: Thu Mar 19 2026 (03/19/2026, 08:39:06 UTC)
Source: CVE Database V5
Vendor/Project: ThimPress
Product: BuilderPress

Description

CVE-2026-27065 is a critical Remote File Inclusion (RFI) vulnerability in the ThimPress BuilderPress WordPress plugin, affecting versions up to 2. 0. 1. The flaw arises from improper control of filenames used in PHP include or require statements, allowing attackers to include and execute remote malicious files. This vulnerability has a CVSS score of 9. 8, indicating a high potential for full system compromise without requiring authentication or user interaction. Exploitation can lead to complete confidentiality, integrity, and availability breaches, including remote code execution, data theft, and site defacement. No public exploits are currently known, but the severity and ease of exploitation make this a significant threat. Organizations using BuilderPress should prioritize patching or applying mitigations immediately. Countries with large WordPress user bases and active threat actors targeting CMS platforms are at higher risk.

AI-Powered Analysis

AILast updated: 03/19/2026, 09:09:06 UTC

Technical Analysis

CVE-2026-27065 is a critical vulnerability classified under CWE-98, which involves improper control of filenames used in PHP include or require statements within the ThimPress BuilderPress plugin for WordPress. This vulnerability allows an attacker to perform Remote File Inclusion (RFI), whereby they can supply a crafted filename parameter that causes the application to include and execute remote malicious PHP code. The affected versions include all releases up to 2.0.1, with no specific lower bound version identified. The vulnerability is remotely exploitable over the network without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to full compromise of the web server, enabling attackers to execute arbitrary code, steal sensitive data, modify or delete content, and disrupt service availability. Although no known exploits are publicly documented yet, the critical CVSS score of 9.8 reflects the high impact and ease of exploitation. The root cause is insufficient validation or sanitization of user-controlled input used in PHP include/require statements, a common security weakness in PHP applications. The plugin’s widespread use in WordPress sites for building and managing content makes this vulnerability particularly dangerous, as it can be leveraged to compromise numerous websites globally. The lack of available patches at the time of publication necessitates immediate risk mitigation by administrators.

Potential Impact

The impact of CVE-2026-27065 is severe for organizations running WordPress sites with the BuilderPress plugin installed. Attackers exploiting this vulnerability can achieve remote code execution on the web server, leading to complete system compromise. This can result in unauthorized data access or theft, defacement or destruction of website content, installation of backdoors or malware, and disruption of website availability. For e-commerce, financial, healthcare, or government websites, such breaches can lead to significant financial losses, reputational damage, regulatory penalties, and erosion of customer trust. Additionally, compromised sites can be used as launchpads for further attacks within an organization's network or to distribute malware to visitors. The vulnerability’s ease of exploitation and lack of required authentication increase the likelihood of widespread attacks once exploit code becomes available. Organizations with limited security monitoring or outdated plugin versions are particularly vulnerable to rapid compromise.

Mitigation Recommendations

To mitigate CVE-2026-27065, organizations should immediately audit their WordPress installations for the presence of the BuilderPress plugin and verify the version in use. If possible, update to a patched version once released by ThimPress. Until a patch is available, consider disabling or uninstalling the plugin to eliminate the attack surface. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as those containing unexpected URL parameters or remote file references. Restrict PHP configurations to disable allow_url_include and allow_url_fopen directives, preventing inclusion of remote files. Employ strict input validation and sanitization on all user-supplied parameters, especially those used in file operations. Monitor server logs for unusual access patterns or errors related to file inclusion. Conduct regular security scans and penetration tests to identify similar vulnerabilities. Finally, maintain robust backup and incident response plans to recover quickly in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-17T13:23:42.767Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bbb9bce32a4fbe5fa803c0

Added to database: 3/19/2026, 8:54:20 AM

Last enriched: 3/19/2026, 9:09:06 AM

Last updated: 3/19/2026, 10:10:26 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses