Impact
The WoodMart WordPress theme contains a Local File Inclusion vulnerability in all versions up to 8.2.3 through the 'layout' attribute. An authenticated user with Contributor level or higher can cause the WordPress instance to include and execute arbitrary .php files on the server, enabling any PHP code present to run. This allows attackers to bypass existing access controls, disclose sensitive information, and achieve full code execution if executable files can be placed in or pointed to on the system. The flaw is classified as CWE‑98.
Affected Systems
The vulnerability affects the xTemos WoodMart WordPress theme for versions 8.2.3 and earlier. Any WordPress site using this theme version can be impacted.
Risk and Exploitability
The CVSS score is 8.8, indicating a high severity risk. The EPSS score is under 1% which suggests a low probability of exploitation in the wild at this time, and the vulnerability is not listed in CISA KEV catalogs. Exploitation requires a valid Contributor‑level or higher authenticated session and either the ability to upload or point to a .php file that can be included by the vulnerable parameter. If these conditions are met, the attacker can run arbitrary PHP, achieving complete compromise of the affected server.
OpenCVE Enrichment
EUVD