Impact
The vulnerability arises from improper control of the filename used in a PHP include/require statement, enabling an attacker to include arbitrary local files. This local file inclusion can lead to disclosure of sensitive data, execution of malicious code on the server, and potential compromise of the entire WordPress site. The weakness corresponds to CWE-98.
Affected Systems
Affected systems include any WordPress installation running the Catch Dark Mode plugin from any version up to and including 2.0.1. The plugin is developed by Catch Themes. Users of versions n/a through <= 2.0.1 are susceptible if the plugin is active on a live site.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation at this time. The vulnerability is not currently listed in the CISA KEV catalog. The attack vector is inferred to be a local file inclusion request that could be triggered via a crafted URL or form input, allowing a remote attacker to specify a file path and read server files or execute code if the server environment permits.
OpenCVE Enrichment
EUVD