Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes ElectroServ electroserv allows PHP Local File Inclusion.This issue affects ElectroServ: from n/a through <= 1.3.2.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion can lead to remote code execution or unauthorized disclosure of sensitive files
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from an uncontrolled filename in a PHP include/require statement within the AncoraThemes ElectroServ theme. Based on the description, it is inferred that user input is not sanitized, allowing an attacker to supply a path that resolves to arbitrary files on the server. This local file inclusion can expose sensitive configuration files or enable the execution of arbitrary code if the attacker can place a PHP file in an accessible location. The flaw is classified as CWE‑98 and carries a CVSS score of 8.1, indicating a high level of severity.

Affected Systems

The issue affects every release of the ElectroServ theme up to and including version 1.3.2, which are delivered to WordPress sites by AncoraThemes. Any site that has installed these versions, or that has not removed the vulnerable code path, is potentially compromised. Upgrading to a newer revision that addresses the insecure include logic or switching to a secure alternative is necessary to mitigate the risk.

Risk and Exploitability

With a CVSS score of 8.1, the flaw is considered high severity, yet the current EPSS score of less than 1% suggests that exploitation is not widespread as of now. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating no publicly reported active exploits. However, the local nature of the inclusion means that an attacker who can influence the input parameter—likely through a crafted HTTP request that controls the include filename—could trigger the flaw. Therefore, sites must assess how external input can reach the vulnerable parameter and consider the threat of local file inclusion.

Generated by OpenCVE AI on April 16, 2026 at 12:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest ElectroServ theme release that removes the insecure include logic or replace the theme with a secure alternative
  • If an upgrade cannot be performed immediately, restrict the include path to a whitelist or eliminate the vulnerable parameter handling to prevent arbitrary file access
  • Apply restrictive file permissions and web server access controls to limit external users from uploading or modifying files that could be included by the theme

Generated by OpenCVE AI on April 16, 2026 at 12:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes electroserv
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes electroserv
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes ElectroServ electroserv allows PHP Local File Inclusion.This issue affects ElectroServ: from n/a through <= 1.3.2.
Title WordPress ElectroServ theme <= 1.3.2 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes Electroserv
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:50.092Z

Reserved: 2026-01-07T12:22:12.276Z

Link: CVE-2026-22435

cve-icon Vulnrichment

Updated: 2026-03-10T15:25:02.751Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:17.663

Modified: 2026-03-10T18:18:09.913

Link: CVE-2026-22435

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:00:11Z

Weaknesses