Description
The kallyas theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.21.0 via the 'TH_LatestPosts4` widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Published: 2025-07-26
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

The KALLYAS WordPress theme contains a local file inclusion flaw in the TH_LatestPosts4 widget. Because the widget evaluates user‑supplied parameters and includes them without proper validation, an attacker who can authenticate with Contributor or higher privileges can include any .php file present on the server. This enables arbitrary PHP execution, which can be used to bypass the WordPress access controls, read sensitive files, or run malicious code. The vulnerability is a classic example of CWE-98.

Affected Systems

All releases of the theme up to and including version 4.21.0 are affected. The theme is distributed by hogash as a multi‑purpose WordPress theme for eCommerce sites. The flaw therefore applies to any WordPress installation that has installed any of these vulnerable versions, regardless of the specific site content or configuration. Administrators should identify whether the site uses KALLYAS and verify the particular version number.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity with moderate‑to‑high impact. The EPSS score is less than 1%, suggesting that the probability of an exploitation carry on a given day is low, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, because the flaw requires authenticated access, it is practical only for attackers who can gain Contributor or higher roles, but those roles are typically granted to trusted collaborators. If an attacker obtains such credentials, code execution can be achieved without further privilege escalation. The attack vector is Web‑based, leveraging the WordPress admin interface and the vulnerable widget.

Generated by OpenCVE AI on April 20, 2026 at 20:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the KALLYAS theme to the latest released version, which removes the vulnerable TH_LatestPosts4 widget functionality.
  • If an upgrade is delayed, immediately disable the TH_LatestPosts4 widget for all contributors and higher users or remove its access entirely so that only administrators can use it.
  • Restrict uploaded file types on the server and configure PHP to prevent execution of user‑uploaded or locally stored PHP files; apply file‑type and MIME type validation to block execution of attacker‑controlled code.

Generated by OpenCVE AI on April 20, 2026 at 20:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-22781 The kallyas theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.21.0 via the 'TH_LatestPosts4` widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
History

Mon, 28 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 28 Jul 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 26 Jul 2025 07:45:00 +0000

Type Values Removed Values Added
Description The kallyas theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.21.0 via the 'TH_LatestPosts4` widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Title Kallyas <= 4.21.0 - Authenticated (Contributor+) Local File Inclusion
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:28:14.869Z

Reserved: 2025-07-01T21:14:20.796Z

Link: CVE-2025-6991

cve-icon Vulnrichment

Updated: 2025-07-28T15:10:36.398Z

cve-icon NVD

Status : Deferred

Published: 2025-07-26T08:15:26.337

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6991

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T20:15:06Z

Weaknesses