Impact
The vulnerability is a PHP Local File Inclusion flaw caused by improper validation of file names in the include/require statements of the Mikado‑Themes Curly Core plugin. An attacker can craft a request that causes the plugin to read arbitrary files from the server, potentially leading to disclosure of sensitive configuration files or execution of attacker‑supplied PHP code. This weakness is classified as a CWE‑98 vulnerability.
Affected Systems
The flaw is present in all releases of the Curly Core plugin up to and including version 2.1.6, which is distributed for WordPress sites. Any WordPress installation that has the plugin installed and is running a vulnerable version is at risk. The affected product is named Mikado‑Themes Curly Core on the Vendor side, and it is deployed as a WordPress plugin.
Risk and Exploitability
The CVSS score is 8.1, indicating high severity, while the EPSS score is below 1 %, suggesting that active exploitation is currently unlikely. The vulnerability is not listed in CISA's KEV catalog, but it can be exploited from a remote attacker who can trigger the vulnerable request via a web browser or automated script. If an attacker succeeds, they can read arbitrary files or execute code, leading to full compromise of the affected WordPress site.
OpenCVE Enrichment