Researchers observed Iran-linked actors targeting IP cameras across Israel and Gulf countries, likely to support military intelligence and battle damage assessment. According to the Check Point Cyber Security Report 2026, cyber operations are increasingly used to support military activity and battle damage assessment (BDA). During the Israel-Iran tensions, researchers from Check Point Software Technologies observed […]
A vulnerability was found in ThemeREX Beacon Plugin up to 2.24 on WordPress. It has been classified as critical. This issue affects some unknown processing. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is uniquely identified as CVE-2026-28050. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in ThemeREX Yacht Rental Plugin up to 2.6 on WordPress. It has been declared as critical. Impacted is an unknown function. The manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability was named CVE-2026-28051. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in ThemeREX Miller Plugin up to 1.3.3 on WordPress. It has been rated as critical. The affected element is an unknown function. This manipulation causes improper control of filename for include/require statement in php program ('php remote file inclusion').
The identification of this vulnerability is CVE-2026-28053. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in ThemeREX M.Williamson Plugin up to 1.2.11 on WordPress. The impacted element is an unknown function. Such manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is referenced as CVE-2026-28055. It is possible to launch the attack remotely. No exploit is available.
A vulnerability identified as critical has been detected in ThemeREX MCKinneys Politics Plugin up to 1.2.8 on WordPress. This affects an unknown function. Performing a manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is identified as CVE-2026-28056. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as critical has been found in ThemeREX Dixon Plugin up to 1.4.2.1 on WordPress. This impacts an unknown function. Executing a manipulation can lead to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is tracked as CVE-2026-28058. The attack can be launched remotely. No exploit exists.
A vulnerability marked as critical has been reported in ThemeREX Peter Mason Plugin up to 1.4.5 on WordPress. Affected is an unknown function. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is listed as CVE-2026-28052. The attack may be initiated remotely. There is no available exploit.
A vulnerability described as critical has been identified in ThemeREX Mandala Plugin up to 2.8 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is cataloged as CVE-2026-28057. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in ThemeREX Legal Stone Plugin up to 1.2.11 on WordPress. Affected by this issue is some unknown functionality. This manipulation causes improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is registered as CVE-2026-28054. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability classified as critical was found in ThemeREX Dermatology Clinic Plugin up to 1.4.3 on WordPress. This affects an unknown part. Such manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is documented as CVE-2026-28059. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as critical, has been found in ThemeREX S.King Plugin up to 1.5.3 on WordPress. This vulnerability affects unknown code. Performing a manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is reported as CVE-2026-28060. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as critical, was found in ThemeREX Happy Baby Plugin up to 1.2.12 on WordPress. This issue affects some unknown processing. Executing a manipulation can lead to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability appears as CVE-2026-28062. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in ThemeREX Asia Garden Plugin up to 1.3.1 on WordPress. It has been rated as critical. This impacts an unknown function. Performing a manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability was named CVE-2026-28063. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as critical has been detected in ThemeREX Tiger Claw Plugin up to 1.1.14 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is referenced as CVE-2026-28061. Remote exploitation of the attack is possible. No exploit is available.