Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Quantum quantum allows PHP Local File Inclusion.This issue affects Quantum: from n/a through <= 1.0.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

AncoraThemes Quantum theme suffers from an Improper Control of Filename for Include/Require Statement flaw, classified as a Local File Inclusion vulnerability (CWE‑98). This weakness allows an attacker to influence the file path used by PHP’s include/require functions, which can lead to reading sensitive system files or executing arbitrary code if the attacker can trigger the inclusion of a crafted file. The vulnerability can therefore expose confidential data or compromise the entire WordPress installation when exploited. The description indicates a potential for remote code execution, as the inclusion can execute code present in the targeted files.

Affected Systems

WordPress sites using any version of the Quantum theme from its very first release up to and including 1.0 are affected. The product is AncoraThemes Quantum; no lower version boundary is specified, hence all installed versions older than 1.1 are vulnerable.

Risk and Exploitability

The CVSS score of 8.1 classifies this issue as high severity, while the EPSS score of less than 1% indicates a low probability of widespread exploitation at this time. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers are likely to exploit this flaw remotely through crafted web requests that manipulate the file path parameter used by the theme’s code. Successful exploitation would require the attacker to send the request to a target WordPress site that still hosts the vulnerable theme. No specific authentication or privilege escalation requirements are mentioned, suggesting that even unauthenticated users could attempt the attack.

Generated by OpenCVE AI on April 16, 2026 at 12:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Quantum theme to a newer version that fixes the LFI flaw—if no update exists, delete or replace the theme with a secure alternative.
  • If the theme must remain in use, modify its code to validate all file paths before inclusion, restricting them to trusted directories and blocking arbitrary paths.
  • Apply operating‑system level file‑permission hardening and use a security plugin or .htaccess rules to prevent web access to sensitive files such as wp-config.php, log files, and backups.

Generated by OpenCVE AI on April 16, 2026 at 12:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes quantum
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes quantum
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Quantum quantum allows PHP Local File Inclusion.This issue affects Quantum: from n/a through <= 1.0.
Title WordPress Quantum theme <= 1.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes Quantum
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:47.157Z

Reserved: 2026-01-07T12:22:01.195Z

Link: CVE-2026-22421

cve-icon Vulnrichment

Updated: 2026-03-09T16:40:51.128Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:16.150

Modified: 2026-03-09T17:16:14.390

Link: CVE-2026-22421

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:00:11Z

Weaknesses