Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes The Mounty the-mounty allows PHP Local File Inclusion.This issue affects The Mounty: from n/a through <= 1.1.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Immediate Patch
AI Analysis

Impact

The Mounty theme contains a local file inclusion vulnerability caused by an unchecked filename parameter in a PHP include/require statement, allowing an attacker to read or execute files on the web server. An attacker who can supply a filename could read sensitive files such as configuration files or, if a malicious file can be placed on the server, execute arbitrary PHP code.

Affected Systems

Any WordPress installation that uses The Mounty theme from the initial release up to and including version 1.1 is affected. AncoraThemes markets this theme under that vendor name, and all releases prior to 1.2 are considered vulnerable.

Risk and Exploitability

The flaw carries a CVSS score of 8.1, indicating high severity. EPSS is below 1%, so current public exploitation is unlikely, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local access or the ability to supply an arbitrary filename via the theme’s parameter; an attacker with write access could also upload a malicious file and trigger the inclusion.

Generated by OpenCVE AI on April 16, 2026 at 05:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to The Mounty theme version 1.2 or later to remove the vulnerable include logic
  • If an upgrade is not possible, disable or remove the file inclusion functionality by deactivating the theme or modifying the code to restrict allowable include paths
  • Ensure WordPress and PHP file permissions prevent unauthorized file read and that any themes or plugins are kept up to date

Generated by OpenCVE AI on April 16, 2026 at 05:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes the Mounty
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes the Mounty
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes The Mounty the-mounty allows PHP Local File Inclusion.This issue affects The Mounty: from n/a through <= 1.1.
Title WordPress The Mounty theme <= 1.1 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes The Mounty
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:46.203Z

Reserved: 2026-01-07T12:22:01.195Z

Link: CVE-2026-22415

cve-icon Vulnrichment

Updated: 2026-03-09T16:46:47.910Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:15.310

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-22415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:45:26Z

Weaknesses