CVE-2026-25464
Local File Inclusion Vulnerability in Jannah PHP
Publication date: 2026-03-25
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tie_labs | jannah | to 7.6.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-98 | The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The Local File Inclusion (LFI) vulnerability in the Jannah WordPress theme can lead to unauthorized access to sensitive information such as database credentials. This exposure increases the risk of data breaches, which can result in non-compliance with data protection regulations like GDPR and HIPAA that require safeguarding personal and sensitive data.
Exploitation of this vulnerability could lead to a complete database takeover, potentially exposing personal data protected under these regulations. Failure to protect such data adequately may result in legal and financial penalties under these compliance frameworks.
Therefore, organizations using the affected theme should consider this vulnerability a significant compliance risk and apply mitigations or patches promptly to maintain adherence to common standards and regulations.
Can you explain this vulnerability to me?
CVE-2026-25464 is a Local File Inclusion (LFI) vulnerability found in the WordPress Jannah Theme versions up to and including 7.6.3. It allows unauthenticated attackers to include and display local files from the target website by exploiting improper control of filename parameters in PHP include/require statements.
This means an attacker can trick the application into loading files from the server that should not be accessible, potentially exposing sensitive information.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to exposure of sensitive information such as database credentials. Depending on the website's configuration, it could result in a complete database takeover.
Because the vulnerability is unauthenticated and has a high severity score (8.1), it is likely to be targeted in mass-exploit campaigns, putting many websites at risk regardless of their popularity or traffic.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
CVE-2026-25464 is a Local File Inclusion (LFI) vulnerability affecting the WordPress Jannah Theme up to version 7.6.3. Detection typically involves monitoring for attempts to exploit the vulnerability by including local files via crafted HTTP requests.
To detect exploitation attempts on your system or network, you can monitor web server logs for suspicious requests containing patterns that attempt to include local files, such as parameters with directory traversal sequences (e.g., ../) or references to sensitive files like /etc/passwd.
Example commands to search for potential exploitation attempts in Apache or Nginx access logs include:
- grep -i 'include' /var/log/apache2/access.log
- grep -E '\.\./|etc/passwd' /var/log/nginx/access.log
- tail -f /var/log/apache2/access.log | grep -i 'jannah'
Additionally, using web application firewalls (WAFs) or intrusion detection systems (IDS) with rules targeting LFI patterns can help detect and alert on exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Since no official patch is currently available for CVE-2026-25464, immediate mitigation steps are critical to protect your system.
- Implement the mitigation rule provided by Patchstack to block attacks exploiting this Local File Inclusion vulnerability.
- Contact your hosting provider or web developer to assist in applying temporary mitigations or hardening your WordPress installation.
- Monitor your web server logs and network traffic for suspicious activity related to this vulnerability.
- As soon as an official patch becomes available, update the Jannah theme to the patched version immediately.
Continuous security monitoring and rapid response are advised to reduce the risk of exploitation until a permanent fix is applied.