Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Ekoterra - NonProfit, Green Energy & Ecology Theme ekoterra allows PHP Local File Inclusion.This issue affects Ekoterra - NonProfit, Green Energy & Ecology Theme: from n/a through <= 1.0.0.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Apply Patch
AI Analysis

Impact

An improperly validated include path within the Ekoterra theme’s PHP code permits an attacker to supply arbitrary filename values, enabling local file inclusion. By forcing the theme to include files residing outside the intended directory, an attacker may read sensitive files such as configuration or code, potentially leading to further exploitation or exposure of confidential data. The flaw is a classic CWE‑98 vulnerability and is not limited to remote execution but can serve as a foothold for subsequent attacks.

Affected Systems

WordPress installations that have deployed AncoraThemes Ekoterra — NonProfit, Green Energy & Ecology Theme version 1.0.0 or earlier are affected. The flaw resides in the theme’s core files and is triggered when an attacker provides a crafted query parameter that is passed directly to PHP’s include or require statements. Sites running an updated theme or a different theme are not impacted by this issue.

Risk and Exploitability

The CVSS base score of 8.1 classifies this as high severity, and while the EPSS score is reported as less than 1 %, indicating low current exploitation probability, the vulnerability remains exploitable if an attacker can craft a request that includes the malicious file path. The attack vector is likely local or remote access to a WordPress page where the theme processes user‑supplied parameters. The vulnerability is not listed in the CISA catalog of known exploited vulnerabilities, suggesting no confirmed widespread exploitation as of now.

Generated by OpenCVE AI on April 16, 2026 at 05:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Ekoterra theme to the latest version, which removes the vulnerable file inclusion logic.
  • If an update is not available, deactivate or remove the Ekoterra theme to prevent exploitation.
  • Configure the web server or WordPress to block direct access to the theme’s directory or limit PHP’s include path to only whitelisted files.
  • Review the theme’s PHP files and sanitize any user‑supplied file names, ensuring only allowed filenames are processed.

Generated by OpenCVE AI on April 16, 2026 at 05:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes ekoterra - Nonprofit, Green Energy & Ecology Theme
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes ekoterra - Nonprofit, Green Energy & Ecology Theme
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Ekoterra - NonProfit, Green Energy & Ecology Theme ekoterra allows PHP Local File Inclusion.This issue affects Ekoterra - NonProfit, Green Energy & Ecology Theme: from n/a through <= 1.0.0.
Title WordPress Ekoterra - NonProfit, Green Energy & Ecology Theme theme <= 1.0.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes Ekoterra - Nonprofit, Green Energy & Ecology Theme
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:07.824Z

Reserved: 2026-02-19T09:51:27.898Z

Link: CVE-2026-27335

cve-icon Vulnrichment

Updated: 2026-03-09T13:11:57.510Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:23.977

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-27335

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:15:25Z

Weaknesses