Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Innovio innovio allows PHP Local File Inclusion.This issue affects Innovio: from n/a through <= 1.7.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion, potential Remote Code Execution
Action: Update Theme
AI Analysis

Impact

This flaw originates in an improper handling of filenames used in PHP include/require statements within the Innovio WordPress theme. As a result, attackers can influence the file path that the theme processes, enabling them to read any file on the server that is accessible to the web server process. This issue is a CWE‑98 vulnerability (Improper Control of Filename for Include/Require). If the included file contains executable PHP code, the attacker could potentially execute that code, which is inferred from the description of the vulnerability. This could lead to full compromise of the website. The vulnerability carries a high severity score of 8.1 according to the industry standard scoring system.

Affected Systems

The issue affects the Mikado-Themes Innovio WordPress theme versions 1.7 and all earlier releases. No information is available for versions above 1.7, so any site running 1.7 or earlier is considered vulnerable.

Risk and Exploitability

The reported exploitation probability is less than 1%, indicating that widespread attacks are not common and the flaw is not listed in the known exploited vulnerabilities catalog. Still, the high severity underscores significant potential impact. An attacker can likely leverage crafted URLs or user‑supplied input that influences the include path, potentially without authentication if the theme does not enforce proper checks. Successful exploitation would permit the attacker to read sensitive configuration files or execute arbitrary PHP code, which is inferred from the vulnerability description, thereby compromising the entire website.

Generated by OpenCVE AI on April 18, 2026 at 09:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Innovio theme to a release that removes the vulnerable include logic.
  • If an upgrade is not immediately possible, disable or delete the Innovio theme to eliminate the attack surface.
  • Implement web‑application or server‑level controls that restrict include paths to known safe directories and validate any user input used in file operations; consider deploying a firewall rule that blocks directory traversal patterns such as "../" in request parameters.

Generated by OpenCVE AI on April 18, 2026 at 09:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes innovio
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes innovio
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Innovio innovio allows PHP Local File Inclusion.This issue affects Innovio: from n/a through <= 1.7.
Title WordPress Innovio theme <= 1.7 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Mikado-themes Innovio
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:44.101Z

Reserved: 2026-01-07T12:21:46.518Z

Link: CVE-2026-22403

cve-icon Vulnrichment

Updated: 2026-03-10T14:21:31.702Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:14.350

Modified: 2026-03-10T18:18:07.700

Link: CVE-2026-22403

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:00:10Z

Weaknesses