Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32392: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Creatives_Planet Greenly

0
Unknown
VulnerabilityCVE-2026-32392cvecve-2026-32392
Published: Fri Mar 13 2026 (03/13/2026, 11:42:10 UTC)
Source: CVE Database V5
Vendor/Project: Creatives_Planet
Product: Greenly

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creatives_Planet Greenly greenly allows PHP Local File Inclusion.This issue affects Greenly: from n/a through <= 8.1.

AI-Powered Analysis

AILast updated: 03/13/2026, 12:51:19 UTC

Technical Analysis

CVE-2026-32392 identifies a Remote File Inclusion vulnerability in the Creatives_Planet Greenly PHP application, specifically versions up to 8.1. The vulnerability stems from improper validation and control of filenames passed to PHP's include or require statements. This flaw allows an attacker to manipulate the filename parameter to include arbitrary files, potentially from remote servers if remote file inclusion is enabled, or local files on the server. Such inclusion can lead to execution of malicious code, unauthorized disclosure of sensitive information, or complete compromise of the affected system. The vulnerability is categorized as a PHP Remote File Inclusion (RFI) issue, which is a critical web application security risk. Although no CVSS score is assigned, the nature of RFI vulnerabilities typically allows unauthenticated attackers to execute arbitrary code remotely, making it highly severe. The vulnerability affects all versions of Greenly up to 8.1, with no patch currently linked, indicating that users must rely on other mitigations until an official update is released. No known exploits have been reported in the wild yet, but the potential impact warrants immediate attention. The vulnerability was reserved and published in March 2026, indicating recent discovery. The lack of CWE identifiers suggests the need for further classification, but the core issue is improper input validation leading to insecure file inclusion. This vulnerability is particularly dangerous in web-facing environments where user input is not properly sanitized before being used in file inclusion functions.

Potential Impact

The impact of CVE-2026-32392 is significant for organizations using the Greenly application, especially those exposing it to the internet. Successful exploitation can lead to remote code execution, allowing attackers to run arbitrary PHP code on the server. This can result in full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks within the network. Confidentiality is at risk due to potential access to sensitive files. Integrity can be compromised by altering application behavior or injecting malicious scripts. Availability may be affected if attackers disrupt services or deploy ransomware. Since the vulnerability does not require authentication, the attack surface is broad. Organizations relying on Greenly for content management or other web services face operational and reputational risks. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's nature makes it a prime target for attackers once exploit code becomes available. The lack of an official patch increases the urgency for interim mitigations. Industries with high-value data or critical web infrastructure are particularly vulnerable, including e-commerce, media, and government sectors.

Mitigation Recommendations

To mitigate CVE-2026-32392, organizations should first verify if they are running affected versions of Greenly (up to 8.1) and plan for immediate upgrade once a patch is released. Until then, implement strict input validation and sanitization on all parameters that influence file inclusion, ensuring only expected and safe filenames are processed. Disable PHP's allow_url_include directive to prevent remote file inclusion if it is enabled. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file inclusion attempts. Restrict file permissions on the server to limit access to sensitive files and directories. Conduct thorough code reviews to identify and refactor unsafe include/require statements, replacing dynamic file inclusion with safer alternatives. Monitor logs for unusual requests or errors related to file inclusion. Isolate the Greenly application environment to minimize potential lateral movement in case of compromise. Educate developers and administrators about secure coding practices related to file inclusion. Finally, subscribe to vendor advisories and security bulletins to apply official patches promptly upon release.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-03-12T11:11:09.667Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b3fc742f860ef943d17af5

Added to database: 3/13/2026, 12:00:52 PM

Last enriched: 3/13/2026, 12:51:19 PM

Last updated: 3/15/2026, 9:30:42 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses