Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Anona anona allows Path Traversal.This issue affects Anona: from n/a through <= 8.0.
Published: 2026-01-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

AivahThemes\" Anona theme for WordPress contains an improper limitation of the pathname to a restricted directory, allowing attackers to perform path traversal and download arbitrary files from the server. The flaw is a classic CWE‑22 condition, where user-controlled input is used to construct a file path without adequate validation or sanitization. When exploited, an attacker can read sensitive files on the web server, which compromises confidentiality and may facilitate further attacks.

Affected Systems

The vulnerability impacts the Anona theme distributed by AivahThemes. All versions from the initial release up through 8.0 are affected; any installation of the theme on a WordPress site using these versions is at risk.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity threat, while the EPSS score of less than 1% suggests a low to moderate current exploitation probability. The vulnerability is not yet listed in the CISA KEV catalog. Typically, the attack vector is conducted over the web by sending a crafted request to the theme’s file‑download functionality, implying remote exploitation from an unauthenticated attacker. No prerequisites beyond access to the affected WordPress site are stipulated, making the condition straightforward to meet for an attacker with network visibility to the target.

Generated by OpenCVE AI on April 29, 2026 at 17:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Anona theme to the latest version available, ensuring it is above 8.0 and includes the path‑validation fix.
  • If an upgrade is not immediately possible, disable or remove the theme’s file download feature. This can be done by removing the theme or disabling it via WordPress settings or by renaming the plugin files.
  • As a temporary mitigation, configure the web server or a WAF to block requests containing directory traversal patterns such as "..", or enforce directory restrictions on the theme’s download endpoint.

Generated by OpenCVE AI on April 29, 2026 at 17:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 27 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Anona anona allows Path Traversal.This issue affects Anona: from n/a through <= 8.0.
Title WordPress Anona theme <= 8.0 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:32.689Z

Reserved: 2025-12-24T14:00:47.909Z

Link: CVE-2025-68902

cve-icon Vulnrichment

Updated: 2026-01-27T21:01:56.610Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:13.983

Modified: 2026-04-27T19:16:37.780

Link: CVE-2025-68902

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T17:30:16Z

Weaknesses