Impact
The Zita theme contains PHP code that dynamically includes files based on user-supplied input without validating the filename. This flaw allows an attacker to supply a crafted filename that causes the server to include an arbitrary local file, potentially leading to code execution or disclosure of sensitive data. The vulnerability is classified as high severity, with a CVSS score of 8.1.
Affected Systems
The issue affects any installation of the Zita theme from earlier versions through 1.6.5 on WordPress. All WordPress sites running the theme, including the free distribution from themehunk, are potentially impacted.
Risk and Exploitability
The CVSS score of 8.1 reflects a significant risk, while the EPSS score of less than 1% indicates that real-world exploitation is currently unlikely. The vulnerability is not listed in CISA's KEV catalog, suggesting no publicly known exploitation scripts. Based on the description, the likely attack vector is a local file inclusion triggered by an unsanitized parameter in the theme; an attacker can craft requests that cause the server to read or execute arbitrary local files, potentially leading to injection or remote code execution.
OpenCVE Enrichment
EUVD