Impact
Edumall, a WordPress theme used to build LMS environments, contains a local file inclusion flaw in all releases up to and including 4.2.4. The vulnerability is exercised through the template parameter of the edumall_lazy_load_template AJAX action. An unauthenticated attacker can supply a path to any PHP file on the server; that file is then included and executed in the context of the web server. The result is that an attacker can run arbitrary PHP code, bypass existing access controls, read protected data, or leverage file uploads to achieve full code execution.
Affected Systems
The affected product is ThemeMove’s Edumall Professional LMS Education Center WordPress Theme, versions 4.2.4 and earlier. Any WordPress site that uses one of these theme releases and has not yet applied the fix is at risk.
Risk and Exploitability
The flaw has a CVSS score of 8.1 and an EPSS of less than 1%, indicating high severity but a low present exploitation probability. The vulnerability is not listed in CISA KEV. Attackers exploit the weakness by sending a crafted AJAX request to the site, so the vector is via public web traffic to the edumall_lazy_load_template endpoint, allowing unauthenticated local file inclusion that can lead to remote code execution.
OpenCVE Enrichment
EUVD