Cyber Posture

CVE-2026-25027

High

Published: 03 February 2026

Published
03 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25027 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

LFI vuln in public-facing WordPress/PHP theme directly enables remote exploitation of server-side app (T1190) with resulting arbitrary code execution through script inclusion (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Unicamp unicamp allows PHP Local File Inclusion.This issue affects Unicamp: from n/a through <= 2.7.1.

Deeper analysisAI

CVE-2026-25027 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as PHP Remote File Inclusion but enabling PHP Local File Inclusion (CWE-98), affecting the ThemeMove Unicamp WordPress theme in versions from n/a through 2.7.1. Published on 2026-02-03, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to significant impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited over the network by low-privileged users (PR:L) requiring high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation allows attackers to perform local file inclusion, potentially leading to unauthorized access to sensitive files, code execution, or system compromise on affected WordPress installations running the Unicamp theme.

Patchstack's advisory at https://patchstack.com/database/Wordpress/Theme/unicamp/vulnerability/wordpress-unicamp-theme-2-7-1-local-file-inclusion-vulnerability?_s_id=cve details the Local File Inclusion issue in Unicamp theme version 2.7.1, recommending mitigation through theme updates beyond version 2.7.1 where available.

Details

CWE(s)

CVEs Like This One

CVE-2025-30831Shared CWE-98
CVE-2025-67934Shared CWE-98
CVE-2025-53248Shared CWE-98
CVE-2025-1707Shared CWE-98
CVE-2025-30829Shared CWE-98
CVE-2025-27272Shared CWE-98
CVE-2024-13790Shared CWE-98
CVE-2026-32384Shared CWE-98
CVE-2026-22389Shared CWE-98
CVE-2025-30846Shared CWE-98

References