Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wphocus My auctions allegro my-auctions-allegro-free-edition allows PHP Local File Inclusion.This issue affects My auctions allegro: from n/a through <= 3.6.33.
Published: 2026-01-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Patch Immediately
AI Analysis

Impact

This vulnerability arises from improper control of the filename used in a PHP include/require statement within the My auctions allegro WordPress plugin. The flaw allows an attacker to cause the plugin to load arbitrary local files on the web server, potentially exposing sensitive configuration data, keys, or other confidential information. While the defect does not directly grant remote code execution, the ability to read arbitrary files can serve as a stepping stone to further attacks such as credential harvesting or facilitating execution of malicious scripts if other weaknesses are present.

Affected Systems

The affected product is the WordPress plugin wphocus My auctions allegro, versions from the initial release up to and including 3.6.33. Users who have installed any of these plugin versions on their WordPress sites are susceptible to exploitation.

Risk and Exploitability

The CVSS base score of 7.5 indicates a high severity. The EPSS score of less than 1% suggests that, as of this analysis, the probability of active exploitation in the wild is low, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker would need to deliver a crafted request targeting the plugin’s file handling logic, typically via a web‑based parameter that controls the include path. Based on the description, it is inferred that successful exploitation requires the attacker to have sufficient privileges to read files on the server, but the local file inclusion flaw can lead to sensitive data disclosure or set the stage for downstream attacks.

Generated by OpenCVE AI on April 16, 2026 at 17:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the My auctions allegro plugin to 3.6.34 or later if a patched release is available
  • If an update is not available, deactivate or remove the plugin from the WordPress installation
  • Configure the web application firewall or server settings to block requests that contain suspicious path traversal patterns and restrict the include path to the plugin’s own directory

Generated by OpenCVE AI on April 16, 2026 at 17:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 26 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wphocus
Wphocus my Auctions Allegro
Vendors & Products Wordpress
Wordpress wordpress
Wphocus
Wphocus my Auctions Allegro

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wphocus My auctions allegro my-auctions-allegro-free-edition allows PHP Local File Inclusion.This issue affects My auctions allegro: from n/a through <= 3.6.33.
Title WordPress My auctions allegro plugin <= 3.6.33 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Wordpress Wordpress
Wphocus My Auctions Allegro
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:02.851Z

Reserved: 2026-01-07T13:43:59.553Z

Link: CVE-2026-22464

cve-icon Vulnrichment

Updated: 2026-01-26T19:45:44.408Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:35.277

Modified: 2026-04-23T15:36:32.290

Link: CVE-2026-22464

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:00:11Z

Weaknesses