Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32393: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Creatives_Planet Greenly Theme Addons

0
Unknown
VulnerabilityCVE-2026-32393cvecve-2026-32393
Published: Fri Mar 13 2026 (03/13/2026, 11:42:10 UTC)
Source: CVE Database V5
Vendor/Project: Creatives_Planet
Product: Greenly Theme Addons

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creatives_Planet Greenly Theme Addons greenly-addons allows PHP Local File Inclusion.This issue affects Greenly Theme Addons: from n/a through < 8.2.

AI-Powered Analysis

AILast updated: 03/13/2026, 12:51:04 UTC

Technical Analysis

CVE-2026-32393 is a Local File Inclusion (LFI) vulnerability found in the Creatives_Planet Greenly Theme Addons, a PHP-based theme extension used primarily in content management systems such as WordPress. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary local files on the server. This can lead to disclosure of sensitive information, such as configuration files or source code, and in some cases, enable remote code execution if combined with other vulnerabilities or misconfigurations. The affected versions are all prior to 8.2, with no specific earliest version identified. Although no public exploits are currently known, the vulnerability is critical because LFI flaws are commonly exploited in web environments. The lack of a CVSS score means severity must be inferred from the impact on confidentiality, integrity, and availability, as well as ease of exploitation. Since the vulnerability does not require authentication and can be triggered remotely via crafted HTTP requests, it poses a significant risk to affected web servers. The issue was published on March 13, 2026, by Patchstack, indicating recent discovery and disclosure. No official patches or mitigations are linked yet, emphasizing the need for immediate attention from users of the Greenly Theme Addons.

Potential Impact

The primary impact of CVE-2026-32393 is unauthorized access to local files on web servers running vulnerable versions of the Greenly Theme Addons. This can lead to exposure of sensitive data such as credentials, configuration files, or source code, undermining confidentiality. In some scenarios, attackers may chain this vulnerability with others to achieve remote code execution, threatening system integrity and availability. Organizations relying on PHP-based CMS platforms with this theme addon are at risk of website defacement, data breaches, or full server compromise. The vulnerability can disrupt business operations, damage reputation, and lead to regulatory compliance issues if sensitive customer data is exposed. Since the flaw can be exploited remotely without authentication, the attack surface is broad, increasing the likelihood of exploitation especially in environments with public-facing web servers. The absence of known exploits currently provides a window for proactive mitigation, but the risk remains high due to the commonality of LFI attacks in the wild.

Mitigation Recommendations

1. Immediately upgrade the Greenly Theme Addons to version 8.2 or later once available, as this is expected to contain the fix. 2. Until patches are released, implement strict input validation and sanitization on all parameters that control file inclusion to prevent malicious input. 3. Employ web application firewalls (WAFs) with rules specifically designed to detect and block LFI attack patterns targeting include/require statements. 4. Restrict PHP file inclusion paths using configuration directives such as open_basedir to limit accessible directories. 5. Disable unnecessary PHP functions that facilitate file inclusion or execution if not required by the application. 6. Monitor web server logs for suspicious requests containing directory traversal sequences or unusual file inclusion attempts. 7. Conduct regular security audits and penetration testing focused on file inclusion vulnerabilities. 8. Educate developers and administrators on secure coding practices related to dynamic file inclusion. 9. Isolate critical web applications in segmented network zones to reduce impact in case of compromise. 10. Maintain up-to-date backups to enable rapid recovery if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-03-12T11:11:09.667Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b3fc742f860ef943d17af8

Added to database: 3/13/2026, 12:00:52 PM

Last enriched: 3/13/2026, 12:51:04 PM

Last updated: 3/15/2026, 9:32:10 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses