Impact
The vulnerability arises from improper control of filenames used in PHP include/require statements within the Mikado-Themes Optimize WordPress theme. An attacker who can influence the filename parameter may trigger local file inclusion, enabling the reading of sensitive files on the server or, with the ability to write arbitrary PHP, execution of malicious code.
Affected Systems
Affected products are the Mikado-Themes Optimize WordPress theme, impacting all releases prior to 2.4. No specific patch version details are listed in the CVE, but the core fix is available in version 2.4.
Risk and Exploitability
The CVSS score is 8.1 and the EPSS score is less than 1%, indicating a relatively high impact but a low likelihood of exploitation today. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a crafted URL or form submission that feeds a malicious filename into the theme’s include logic; local file inclusion could then expose sensitive files or lead to code execution if the attacker can place a PHP file on the server.
OpenCVE Enrichment