Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28087: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeREX Filmax

0
Unknown
VulnerabilityCVE-2026-28087cvecve-2026-28087
Published: Thu Mar 05 2026 (03/05/2026, 05:54:23 UTC)
Source: CVE Database V5
Vendor/Project: ThemeREX
Product: Filmax

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Filmax filmax allows PHP Local File Inclusion.This issue affects Filmax: from n/a through <= 1.1.11.

AI-Powered Analysis

AILast updated: 03/05/2026, 06:52:19 UTC

Technical Analysis

CVE-2026-28087 is a Local File Inclusion (LFI) vulnerability found in the ThemeREX Filmax WordPress theme, affecting versions up to 1.1.11. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the server. This can lead to execution of malicious code, disclosure of sensitive files, or further escalation of privileges. The issue is rooted in insecure coding practices where user input is not properly sanitized or validated before being used in file inclusion functions. Although the description mentions 'PHP Remote File Inclusion,' the actual vulnerability is a Local File Inclusion, meaning the attacker can include files already present on the server but cannot directly include remote files. Exploiting this vulnerability typically involves sending crafted HTTP requests to the vulnerable endpoint, which then includes unintended files. This can expose configuration files, source code, or enable execution of malicious scripts if combined with other vulnerabilities. No CVSS score is assigned yet, and no known exploits have been reported in the wild. The vulnerability was published in early March 2026, with no official patches available at the time of reporting. Given the widespread use of WordPress and the popularity of ThemeREX themes, this vulnerability poses a significant risk to websites using Filmax. Attackers could leverage this flaw to compromise website integrity, steal data, or pivot to further attacks within the hosting environment.

Potential Impact

The impact of CVE-2026-28087 can be severe for organizations using the vulnerable Filmax theme. Successful exploitation can lead to unauthorized disclosure of sensitive files such as configuration files containing database credentials, user data, or application source code. Attackers may also execute arbitrary PHP code if they can upload or manipulate files on the server, leading to full site compromise. This can result in data breaches, defacement, loss of customer trust, and potential regulatory penalties. The vulnerability affects the confidentiality, integrity, and availability of affected systems. Since WordPress powers a significant portion of the web, including many business and e-commerce sites, the scope of impact is broad. Organizations with inadequate monitoring or outdated themes are at higher risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the risk, as proof-of-concept exploits may emerge. The vulnerability could also be chained with other weaknesses to escalate attacks. Overall, the threat poses a critical risk to website security and operational continuity.

Mitigation Recommendations

To mitigate CVE-2026-28087, organizations should first check if they are using the Filmax theme version 1.1.11 or earlier and plan to upgrade to a patched version once available. Until an official patch is released, implement virtual patching via Web Application Firewalls (WAFs) to block suspicious requests attempting to manipulate include parameters. Restrict PHP include paths using open_basedir directives to limit file inclusion to trusted directories. Review and harden PHP configurations to disable dangerous functions if possible. Conduct code audits to identify and sanitize all user inputs used in file inclusion statements. Employ strict input validation and whitelist acceptable filenames or paths. Monitor web server logs for anomalous requests indicative of LFI attempts. Backup website data regularly and maintain an incident response plan. Consider isolating the web server environment to minimize lateral movement in case of compromise. Engage with the theme vendor or community for updates and patches. Avoid using untrusted or outdated themes and plugins to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-25T12:13:51.945Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a92066d1a09e29cbe6cf02

Added to database: 3/5/2026, 6:19:18 AM

Last enriched: 3/5/2026, 6:52:19 AM

Last updated: 3/5/2026, 2:39:54 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses