Description
Path Traversal: '.../...//' vulnerability in Mikado-Themes Wanderland wanderland allows PHP Local File Inclusion.This issue affects Wanderland: from n/a through <= 1.7.1.
Published: 2025-11-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw that allows PHP local file inclusion within the Mikado‑Themes Wanderland WordPress theme. By manipulating the path, an attacker can include arbitrary files on the server, which may expose sensitive information or enable remote code execution if malicious files are injected or if existing server files are read and executed. The CVSS score of 8.1 reflects the high impact of this flaw.

Affected Systems

Mikado‑Themes Wanderland theme for WordPress, affecting all releases from the original version up through 1.7.1. The vulnerability is present in every installation that uses Wanderland version 1.7.1 or older, regardless of additional plugins or theme customizations.

Risk and Exploitability

The EPSS score of less than 1% indicates that, so far, the exploit probability is low, and the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, its high CVSS rating means that it could be highly damaging if discovered by attackers. Likely attack vectors involve HTTP requests that target the theme’s publicly accessible files – for example, manipulating query parameters or file paths supplied to theme functions. This suggests the vulnerability could be triggered by unauthenticated users, but the exact conditions are not explicitly stated in the description, so further analysis of the theme’s code would be required to confirm authentication requirements.

Generated by OpenCVE AI on April 30, 2026 at 14:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Wanderland theme to a version newer than 1.7.1 or the latest release available from Mikado‑Themes.
  • If an upgrade is not possible, disable or delete the Wanderland theme entirely to eliminate the vulnerable code path.
  • Configure the web server (e.g., using .htaccess or server‑level rules) to block direct access to PHP files within the theme directory, ensuring that file inclusion endpoints are protected.

Generated by OpenCVE AI on April 30, 2026 at 14:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 29 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Qodeinteractive
Qodeinteractive wanderland
CPEs cpe:2.3:a:qodeinteractive:wanderland:*:*:*:*:*:wordpress:*:*
Vendors & Products Qodeinteractive
Qodeinteractive wanderland

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes wanderland
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes wanderland
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Path Traversal: '.../...//' vulnerability in Mikado-Themes Wanderland wanderland allows PHP Local File Inclusion.This issue affects Wanderland: from n/a through <= 1.7.1.
Title WordPress Wanderland theme <= 1.7.1 - Local File Inclusion Vulnerability
Weaknesses CWE-35
References

Subscriptions

Mikado-themes Wanderland
Qodeinteractive Wanderland
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:32.199Z

Reserved: 2025-04-16T06:23:36.340Z

Link: CVE-2025-39467

cve-icon Vulnrichment

Updated: 2025-11-10T19:40:48.235Z

cve-icon NVD

Status : Modified

Published: 2025-11-06T16:15:51.053

Modified: 2026-04-27T19:16:13.430

Link: CVE-2025-39467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:45:24Z

Weaknesses