Description
Unrestricted Upload of File with Dangerous Type vulnerability in hogash KALLYAS kallyas.This issue affects KALLYAS: from n/a through <= 4.22.0.
Published: 2025-11-06
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an unrestricted file upload flaw that allows an attacker to upload files of dangerous types to the WordPress KALLYAS theme. This is an input validation weakness (CWE‑434) where the theme does not properly filter or validate the MIME type or file extension of uploaded files. The description does not explicitly state that the uploaded file will be executed, but the potential exists for code execution if a malicious script is uploaded.

Affected Systems

All installations of the hogash KALLYAS theme from the first release through version 4.22.0 are affected. Any WordPress site that uses this theme directly or via a child theme is vulnerable.

Risk and Exploitability

The CVSS score of 9.9 marks this as a critical vulnerability, and the EPSS score of less than 1% indicates a very low but non‑zero probability of widespread exploitation. The vulnerability is not currently listed in the CISA KEV catalog. Attackers could exploit the flaw by uploading a crafted file through the theme’s file upload interface if the web server accepts the file and later serves or executes it.

Generated by OpenCVE AI on April 29, 2026 at 16:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the KALLYAS theme to version 4.22.1 or later, which removes the insecure upload handler.
  • If an upgrade cannot be performed immediately, configure the web server or the theme to block uploads of disallowed MIME types and file extensions, restricting uploads to approved image types only.
  • Implement server‑side validation for all uploaded files to enforce strict MIME type and extension checks, ensuring that only safe files are stored and executed.

Generated by OpenCVE AI on April 29, 2026 at 16:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in hogash Kallyas kallyas.This issue affects Kallyas: from n/a through <= 4.22.0. Unrestricted Upload of File with Dangerous Type vulnerability in hogash KALLYAS kallyas.This issue affects KALLYAS: from n/a through <= 4.22.0.

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Hogash
Hogash kallyas
Wordpress
Wordpress wordpress
Vendors & Products Hogash
Hogash kallyas
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in hogash Kallyas kallyas.This issue affects Kallyas: from n/a through <= 4.22.0.
Title WordPress Kallyas theme <= 4.22.0 - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References

Subscriptions

Hogash Kallyas
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:47:22.415Z

Reserved: 2025-10-07T15:34:13.976Z

Link: CVE-2025-62016

cve-icon Vulnrichment

Updated: 2025-11-07T14:05:10.417Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:08.420

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:15:15Z

Weaknesses