Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Impacto Patronus impacto-patronus allows PHP Local File Inclusion.This issue affects Impacto Patronus: from n/a through <= 1.2.3.
Published: 2026-02-20
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion that can lead to arbitrary code execution or sensitive information disclosure
Action: Patch Now
AI Analysis

Impact

The vulnerability is an Improper Control of Filename for Include/Require Statement in PHP, allowing local file inclusion within the AncoraThemes Impacto Patronus theme. An attacker can supply a crafted filename that the theme includes without validation, exposing sensitive files such as configuration files or password files. In the worst case, if the included file contains executable PHP code, the attacker could gain full control over the web application or the underlying server.

Affected Systems

The issue affects the Impacto Patronus WordPress theme released by AncoraThemes, specifically versions up to and including 1.2.3. All installations of these versions are potentially vulnerable.

Risk and Exploitability

With a CVSS score of 8.1 the vulnerability is considered High severity. The EPSS score is reported as less than 1%, indicating current exploitation likelihood is low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is via a web request that manipulates the filename parameter within the theme’s PHP code, which is executed in the context of the web application. Successful exploitation requires that the attacker can influence the input passed to the include/require statement, thereby leading to file disclosure or execution of attacker‑controlled code.

Generated by OpenCVE AI on April 16, 2026 at 06:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Impacto Patronus theme to a version newer than 1.2.3 that removes or sanitizes the vulnerable include call.
  • If an upgrade is not immediately possible, review the theme’s PHP files to ensure that any file names passed to include or require are strictly validated against a whitelist and that relative path traversal is prevented.
  • Configure the web server or application firewall to block requests that attempt to manipulate file paths, such as those containing sequences like "../" or other path traversal patterns.

Generated by OpenCVE AI on April 16, 2026 at 06:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes impacto Patronus
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes impacto Patronus
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Impacto Patronus impacto-patronus allows PHP Local File Inclusion.This issue affects Impacto Patronus: from n/a through <= 1.2.3.
Title WordPress Impacto Patronus theme <= 1.2.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes Impacto Patronus
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:39.662Z

Reserved: 2026-01-07T12:21:36.721Z

Link: CVE-2026-22375

cve-icon Vulnrichment

Updated: 2026-02-24T20:30:52.343Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:36.907

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22375

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:15:26Z

Weaknesses