CVE-2026-32531
Received Received - Intake
Local File Inclusion Vulnerability in Kunco PHP

Publication date: 2026-03-25

Last updated on: 2026-03-25

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gavias kunco to 1.4.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper control of filename for include/require statements in the PHP program 'gavias Kunco'. It is a PHP Local File Inclusion (LFI) issue that affects versions of Kunco before 1.4.5. This means that the application does not properly validate or restrict the filenames used in include or require statements, potentially allowing an attacker to include unintended files from the local server.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to include and display local files from the target website, potentially exposing sensitive information such as database credentials.

Exposure of sensitive data could lead to violations of data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access.

Therefore, exploitation of this vulnerability may result in non-compliance with these common standards and regulations due to the risk of data breaches.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability allows unauthenticated attackers to include and display local files from the target website, which may be detected by monitoring for unusual HTTP requests attempting to include local files via the Kunco theme.

While specific commands are not provided, detection can involve inspecting web server logs for suspicious requests targeting the Kunco theme, especially those attempting to exploit Local File Inclusion (LFI) patterns.

Using tools like grep to search access logs for suspicious parameters or payloads related to file inclusion attempts could help identify exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The immediate recommended step is to update the Kunco WordPress theme to version 1.4.5 or later, where the vulnerability is patched.

Until the update can be applied, it is advised to implement mitigation rules provided by Patchstack to block attacks targeting this vulnerability.

If unable to update promptly, seek assistance from your hosting provider or developers to apply these mitigations and protect your system.


How can this vulnerability impact me? :

The Local File Inclusion vulnerability can allow an attacker to read sensitive files on the server, execute arbitrary code, or gain unauthorized access to the system by including malicious files. This can lead to data breaches, server compromise, or further exploitation of the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart