CVE-2026-32426
Published: 13 March 2026
Summary
CVE-2026-32426 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI in public-facing WordPress plugin directly enables remote exploitation (T1190), local file reads for data access (T1005), and privilege escalation from low-priv authenticated user to full C/I/A impact via code execution (T1068).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themelexus Medilazar Core medilazar-core allows PHP Local File Inclusion.This issue affects Medilazar Core: from n/a through < 1.4.7.
Deeper analysisAI
CVE-2026-32426 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98, affecting the Medilazar Core WordPress plugin developed by themelexus. Specifically, it enables PHP Local File Inclusion despite being described as a PHP Remote File Inclusion issue. The vulnerability impacts all versions of Medilazar Core from n/a through those prior to 1.4.7. It carries a CVSS v3.1 base score of 7.5 (High), with vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility but high attack complexity.
Attackers with low privileges, such as authenticated users with limited roles on a vulnerable WordPress site, can exploit this remotely over the network without user interaction. Successful exploitation allows high-impact confidentiality, integrity, and availability violations, potentially enabling attackers to read sensitive local files, execute arbitrary code via included files, modify site data, or disrupt service.
The Patchstack advisory confirms the Local File Inclusion vulnerability in the Medilazar Core plugin and recommends updating to version 1.4.7 or later to mitigate it, as prior versions remain susceptible.
Details
- CWE(s)