Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28119: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Nirvana

0
High
VulnerabilityCVE-2026-28119cvecve-2026-28119
Published: Thu Mar 05 2026 (03/05/2026, 05:54:28 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Nirvana

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Nirvana nir-vana allows PHP Local File Inclusion.This issue affects Nirvana: from n/a through <= 2.6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:20:01 UTC

Technical Analysis

CVE-2026-28119 is a Remote File Inclusion (RFI) vulnerability found in the axiomthemes Nirvana PHP theme, specifically in versions up to and including 2.6. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. This flaw enables remote attackers to execute arbitrary PHP code on the affected server without requiring authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 8.1, indicating high severity, with attack vector network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as attackers can execute arbitrary code, potentially leading to data theft, defacement, or denial of service. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a critical risk for websites using the Nirvana theme. The vulnerability was reserved on February 25, 2026, and published on March 5, 2026. No official patches or mitigations have been linked yet, requiring users to apply best practices to mitigate risk.

Potential Impact

The impact of CVE-2026-28119 is significant for organizations using the axiomthemes Nirvana PHP theme, particularly those hosting public-facing websites. Successful exploitation allows attackers to execute arbitrary PHP code remotely, leading to full system compromise. This can result in unauthorized data access, data modification or deletion, website defacement, installation of backdoors or malware, and potential pivoting within internal networks. The high severity and ease of exploitation without authentication make this vulnerability a critical risk to confidentiality, integrity, and availability. Organizations relying on this theme for business-critical websites or services may face reputational damage, financial loss, and regulatory consequences if exploited. The absence of known exploits in the wild currently provides a window for remediation, but the vulnerability's nature suggests it could be targeted soon.

Mitigation Recommendations

To mitigate CVE-2026-28119, organizations should immediately audit their use of the axiomthemes Nirvana theme and identify affected versions (up to 2.6). Since no official patches are currently linked, users should consider the following steps: 1) Temporarily disable or remove the Nirvana theme from production environments until a patch is available. 2) Implement web application firewalls (WAFs) with rules to detect and block suspicious include/require parameter usage or remote file inclusion attempts. 3) Restrict PHP configurations by disabling allow_url_include and allow_url_fopen directives to prevent remote file inclusion. 4) Employ input validation and sanitization on any user-controllable parameters related to file inclusion. 5) Monitor web server logs for unusual requests attempting to exploit include/require statements. 6) Stay updated with vendor advisories and apply official patches immediately once released. 7) Consider isolating affected web applications in segmented network zones to limit potential lateral movement. These targeted mitigations go beyond generic advice and address the specific nature of this RFI vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-25T12:14:07.579Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9206ad1a09e29cbe6cf9e

Added to database: 3/5/2026, 6:19:22 AM

Last enriched: 4/3/2026, 1:20:01 AM

Last updated: 4/19/2026, 1:23:49 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses