Impact
The vulnerability arises from an improper control of filename in a PHP include/require statement within the AncoraThemes Netmix WordPress theme. This flaw allows a local file inclusion attack, where an attacker can supply a file path that the application will read and possibly execute. The impact is the potential execution of arbitrary code on the server, with a CVSS score of 8.1 indicating high severity.
Affected Systems
Affected systems are installations of the AncoraThemes Netmix WordPress theme with versions 1.0.10 or earlier. The vulnerability is present in all releases from the initial version up to and including 1.0.10.
Risk and Exploitability
Risk assessment shows a high severity CVSS score but a low EPSS score of less than 1%, and the vulnerability is not currently listed in the CISA Know Exploited Vulnerabilities catalog. The attack vector is inferred to be local file inclusion, likely triggered by a user-supplied parameter that is propagated to an include/require call without proper validation. The exploitation would require access to a path that the web server can read, such as /etc/passwd, but the feasibility depends on server configuration.
OpenCVE Enrichment