Impact
The vulnerability is an improper control of the filename used in a PHP include/require statement in the AncoraThemes Playa WordPress theme. The flaw allows an attacker to specify an arbitrary file path, potentially leading to local file read or execution of malicious PHP code. This weakness is classified as CWE‑98 and can compromise confidentiality, integrity, or availability depending on the files accessed.
Affected Systems
AncoraThemes Playa, a WordPress theme used in multiple websites, is affected for all releases up to and including version 1.3.9. No specific build or patch versions beyond 1.3.9 are impacted.
Risk and Exploitability
With a CVSS score of 8.1 the vulnerability is considered high severity. The EPSS score is reported as less than 1%, indicating a very low likelihood of exploitation at this time. The vulnerability is not currently listed in the CISA KEV catalog. Attackers would likely exploit the flaw through a crafted web request that feeds a malicious filename to the vulnerable include logic. The path to exploitation is local and does not rely on remote code inclusion, but the ability to execute PHP code could elevate the risk to full remote code execution if the arbitrary file is a PHP script.
OpenCVE Enrichment