Impact
The vulnerability arises from uncontrolled handling of filenames used in PHP include/require statements within the Mikado‑Themes Backpack Traveler WordPress theme. An attacker can send specially crafted input that causes the theme to include arbitrary local files, which permits reading of internal configuration or log files. If the included file contains PHP code, the site could execute that code, but the CVE itself does not explicitly confirm arbitrary code execution.
Affected Systems
All releases of the Mikado‑Themes Backpack Traveler WordPress theme up to and including version 2.10.2 are affected. Any WordPress installation that has this theme activated and is running a vulnerable version is at risk.
Risk and Exploitability
With a CVSS score of 8.1 the vulnerability is classified as high severity, yet the EPSS score of < 1 % indicates a very low current exploitation probability. The CVE is not listed in CISA’s KEV catalog. The likely attack vector is remote: an adversary can trigger the flaw by sending a crafted HTTP request to the affected WordPress site while the vulnerable theme is active.
OpenCVE Enrichment
EUVD