{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T03:08:57.622","vulnerabilities":[{"cve":{"id":"CVE-2025-26985","sourceIdentifier":"audit@patchstack.com","published":"2025-02-25T15:15:31.183","lastModified":"2026-04-01T17:19:17.930","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Control of Filename for Include\/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Majestic Support Majestic Support majestic-support allows PHP Local File Inclusion.This issue affects Majestic Support: from n\/a through <= 1.0.6."},{"lang":"es","value":"Vulnerabilidad de control inadecuado del nombre de archivo para la declaración Include\/Require en el programa PHP ('Inclusión de archivo remoto PHP') en Majestic Support Majestic Support permite la inclusión de archivos locales PHP. Este problema afecta a Majestic Support: desde n\/a hasta 1.0.6."}],"metrics":{},"weaknesses":[{"source":"audit@patchstack.com","type":"Secondary","description":[{"lang":"en","value":"CWE-98"}]}],"references":[{"url":"https:\/\/patchstack.com\/database\/Wordpress\/Plugin\/majestic-support\/vulnerability\/wordpress-majestic-support-plugin-1-0-6-local-file-inclusion-vulnerability?_s_id=cve","source":"audit@patchstack.com"}]}}]}