Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Tooth Fairy tooth-fairy allows PHP Local File Inclusion.This issue affects Tooth Fairy: from n/a through <= 1.16.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion potentially leading to remote code execution
Action: Patch Now
AI Analysis

Impact

This vulnerability resides in the AncoraThemes Tooth Fairy WordPress theme, where an improper control of the filename used in an include/require statement allows a local file to be included by a PHP script. Because the theme accepts arbitrary file names from user input, an attacker could read sensitive files on the server or trigger PHP code execution if a remote file is specified and the server allows such includes. The vulnerability type corresponds to CWE-98 and carries a CVSS score of 8.1, indicating high severity.

Affected Systems

All installations of the Tooth Fairy theme from the earliest available version up to and including 1.16 are affected. The product is distributed by AncoraThemes and is typically installed in the /wp-content/themes/tooth-fairy directory of a WordPress site.

Risk and Exploitability

The attack vector is inferred to be local to the web application, as the attacker needs to influence an HTTP request that triggers the vulnerable include. The EPSS score of less than 1% suggests that exploitation is currently rare but still present. The vulnerability is not listed in the CISA KEV catalog, indicating no known mass exploitation at this time. However, the high CVSS score and the simple input manipulation required mean that determined attackers could feasibly achieve code execution or data disclosure on susceptible systems.

Generated by OpenCVE AI on April 16, 2026 at 05:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tooth Fairy theme to version 1.17 or later, where the unsafe include logic is removed.
  • If upgrading immediately is not possible, deactivate or remove the theme from the WordPress installation until a patch is applied.
  • Configure WordPress to set allow_url_include to Off and restrict file system permissions on /wp-content/themes so that included files cannot be chosen arbitrarily.

Generated by OpenCVE AI on April 16, 2026 at 05:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes tooth Fairy
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes tooth Fairy
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Tooth Fairy tooth-fairy allows PHP Local File Inclusion.This issue affects Tooth Fairy: from n/a through <= 1.16.
Title WordPress Tooth Fairy theme <= 1.16 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes Tooth Fairy
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:48.759Z

Reserved: 2026-01-07T12:22:06.512Z

Link: CVE-2026-22428

cve-icon Vulnrichment

Updated: 2026-03-10T14:55:28.740Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:16.850

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-22428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:45:26Z

Weaknesses