Impact
Based on the description, it is inferred that the vulnerability originates from an improper control of the filename used in PHP include/require statements. Attackers can manipulate user‑supplied input to cause the theme to include arbitrary files from the local filesystem. This lack of validation can allow an attacker to read sensitive files or execute malicious code if PHP files are included, potentially compromising confidentiality, integrity, and the overall system.
Affected Systems
The Issue theme from fuelthemes is vulnerable in all releases up to and including version 1.6.11. WordPress sites that have this theme activated are at risk; no specific WordPress core versions are implicated, so any WordPress installation using The Issue theme <= 1.6.11 is considered affected.
Risk and Exploitability
Based on the description, it is inferred that attackers could target the theme via crafted web requests or through authenticated users with file upload capabilities to trigger local file inclusion. The CVSS base score of 8.1 indicates a high‑severity issue, yet the EPSS score is less than 1%, indicating a very low likelihood of exploitation in the wild at the time of analysis. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Successful exploitation could lead to disclosure of sensitive data or execution of arbitrary code if the server permits PHP execution in the targeted files.
OpenCVE Enrichment