CVE-2026-28019: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeREX Manoir
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Manoir manoir allows PHP Local File Inclusion.This issue affects Manoir: from n/a through <= 1.11.
AI Analysis
Technical Summary
CVE-2026-28019 is a Local File Inclusion (LFI) vulnerability found in the ThemeREX Manoir WordPress theme, affecting versions up to 1.11. The vulnerability arises from improper control over the filename used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the server. This can lead to disclosure of sensitive files such as configuration files, password files, or other critical data stored on the server. In some cases, if combined with other vulnerabilities or misconfigurations, it may allow remote code execution by including malicious files uploaded elsewhere on the server. The flaw is due to insufficient input validation or sanitization of the filename parameter used in the theme's PHP code. No public exploits have been reported yet, and no official patch links are available at the time of publication. The vulnerability does not have an assigned CVSS score, but the nature of LFI vulnerabilities typically allows attackers to escalate their access or gather intelligence for further attacks. The affected product is the Manoir theme by ThemeREX, a popular WordPress theme used for portfolio and business websites. Since WordPress powers a significant portion of the web, and themes like Manoir are widely used, the potential attack surface is considerable. The vulnerability was reserved on February 25, 2026, and published on March 5, 2026. The lack of authentication requirements depends on the theme's implementation and how the vulnerable functionality is exposed to users or visitors.
Potential Impact
The impact of CVE-2026-28019 can be significant for organizations using the vulnerable Manoir theme. Successful exploitation can lead to unauthorized disclosure of sensitive server files, including configuration files containing database credentials or API keys, which can facilitate further attacks. In worst-case scenarios, attackers may achieve remote code execution by including malicious files, leading to full site compromise, defacement, data theft, or pivoting to internal networks. This can result in reputational damage, financial losses, and regulatory penalties for organizations. Since WordPress sites often serve as public-facing portals, the vulnerability can be exploited by remote attackers without authentication if the vulnerable code is accessible publicly. The widespread use of WordPress and the Manoir theme increases the potential scale of impact globally. Additionally, attackers may use this vulnerability as a foothold for launching further attacks such as ransomware or supply chain compromises.
Mitigation Recommendations
To mitigate CVE-2026-28019, organizations should first identify all installations of the ThemeREX Manoir theme, especially versions up to 1.11. Until an official patch is released, administrators should restrict access to any endpoints or functionality that involve dynamic file inclusion or disable the vulnerable features if possible. Applying strict input validation and sanitization on any parameters controlling file inclusion is critical; this includes whitelisting allowed filenames or paths and rejecting any input containing directory traversal sequences or remote URLs. Monitoring web server logs for suspicious requests attempting to exploit file inclusion can help detect exploitation attempts early. Organizations should also maintain regular backups and ensure their WordPress core, themes, and plugins are kept up to date. Once ThemeREX releases a security update addressing this vulnerability, prompt application of the patch is essential. Employing Web Application Firewalls (WAFs) with rules targeting LFI patterns can provide an additional layer of defense. Finally, educating developers and administrators about secure coding practices related to file inclusion can prevent similar vulnerabilities in the future.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Brazil, Netherlands, India, Italy
CVE-2026-28019: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeREX Manoir
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Manoir manoir allows PHP Local File Inclusion.This issue affects Manoir: from n/a through <= 1.11.
AI-Powered Analysis
Technical Analysis
CVE-2026-28019 is a Local File Inclusion (LFI) vulnerability found in the ThemeREX Manoir WordPress theme, affecting versions up to 1.11. The vulnerability arises from improper control over the filename used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the server. This can lead to disclosure of sensitive files such as configuration files, password files, or other critical data stored on the server. In some cases, if combined with other vulnerabilities or misconfigurations, it may allow remote code execution by including malicious files uploaded elsewhere on the server. The flaw is due to insufficient input validation or sanitization of the filename parameter used in the theme's PHP code. No public exploits have been reported yet, and no official patch links are available at the time of publication. The vulnerability does not have an assigned CVSS score, but the nature of LFI vulnerabilities typically allows attackers to escalate their access or gather intelligence for further attacks. The affected product is the Manoir theme by ThemeREX, a popular WordPress theme used for portfolio and business websites. Since WordPress powers a significant portion of the web, and themes like Manoir are widely used, the potential attack surface is considerable. The vulnerability was reserved on February 25, 2026, and published on March 5, 2026. The lack of authentication requirements depends on the theme's implementation and how the vulnerable functionality is exposed to users or visitors.
Potential Impact
The impact of CVE-2026-28019 can be significant for organizations using the vulnerable Manoir theme. Successful exploitation can lead to unauthorized disclosure of sensitive server files, including configuration files containing database credentials or API keys, which can facilitate further attacks. In worst-case scenarios, attackers may achieve remote code execution by including malicious files, leading to full site compromise, defacement, data theft, or pivoting to internal networks. This can result in reputational damage, financial losses, and regulatory penalties for organizations. Since WordPress sites often serve as public-facing portals, the vulnerability can be exploited by remote attackers without authentication if the vulnerable code is accessible publicly. The widespread use of WordPress and the Manoir theme increases the potential scale of impact globally. Additionally, attackers may use this vulnerability as a foothold for launching further attacks such as ransomware or supply chain compromises.
Mitigation Recommendations
To mitigate CVE-2026-28019, organizations should first identify all installations of the ThemeREX Manoir theme, especially versions up to 1.11. Until an official patch is released, administrators should restrict access to any endpoints or functionality that involve dynamic file inclusion or disable the vulnerable features if possible. Applying strict input validation and sanitization on any parameters controlling file inclusion is critical; this includes whitelisting allowed filenames or paths and rejecting any input containing directory traversal sequences or remote URLs. Monitoring web server logs for suspicious requests attempting to exploit file inclusion can help detect exploitation attempts early. Organizations should also maintain regular backups and ensure their WordPress core, themes, and plugins are kept up to date. Once ThemeREX releases a security update addressing this vulnerability, prompt application of the patch is essential. Employing Web Application Firewalls (WAFs) with rules targeting LFI patterns can provide an additional layer of defense. Finally, educating developers and administrators about secure coding practices related to file inclusion can prevent similar vulnerabilities in the future.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-02-25T12:13:12.449Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a9205ad1a09e29cbe69b24
Added to database: 3/5/2026, 6:19:06 AM
Last enriched: 3/5/2026, 7:34:45 AM
Last updated: 3/5/2026, 2:53:44 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3598: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in rustdesk-server-pro RustDesk Server Pro
HighCVE-2026-27750: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Gen Digital Inc. Avira Internet Security
HighCVE-2026-27749: CWE-502 Deserialization of Untrusted Data in Gen Digital Inc. Avira Internet Security
HighCVE-2026-27748: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Gen Digital Inc. Avira Internet Security
HighCVE-2026-1720: CWE-862 Missing Authorization in wpxpo WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.