Impact
The vulnerability arises from improper validation of filenames used in include/require statements, enabling attackers to supply arbitrary file paths. This flaw can lead to reading or executing local files, exposing sensitive configuration data or allowing arbitrary code execution when the included file contains malicious content.
Affected Systems
WordPress sites that have the Giardino theme from axiomthemes installed in any version up to and including 1.1.10 are affected. The CVE explicitly states the range "n/a through <= 1.1.10".
Risk and Exploitability
The CVSS score of 8.1 indicates a high risk level. EPSS is less than 1%, indicating a very low probability of exploitation in the wild at this time, and the vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector involves sending a crafted URL or form input that manipulates the include path, making this flaw exploitable from a web client if the theme processes untrusted input.
OpenCVE Enrichment