Impact
The vulnerability arises from improper control of the filename used in a PHP include/require statement within the HeartStar theme for WordPress, a classic local file inclusion flaw classified as CWE‑98. If an attacker can supply a crafted file path, the theme may read any file on the server or, if the file contains PHP, execute it, thereby compromising the confidentiality, integrity, and availability of the affected website.
Affected Systems
The HeartStar theme from axiomthemes, version 1.0.14 and earlier on WordPress installations, is impacted. Users running any version of the theme up through 1.0.14 should verify their deployment.
Risk and Exploitability
With a CVSS score of 8.1 the vulnerability is deemed high severity. The EPSS score is below 1 %, indicating a low probability of exploitation at this time, and the flaw is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker could trigger the LFI by manipulating a URL parameter that feeds the include path, such as appending a path traversal sequence. If the target server allows execution of included files, the attacker could achieve full remote code execution on the WordPress installation.
OpenCVE Enrichment