Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Chronicle - Lifestyle Magazine & Blog WordPress Theme chronicle allows PHP Local File Inclusion.This issue affects Chronicle - Lifestyle Magazine & Blog WordPress Theme: from n/a through <= 1.0.
Published: 2026-03-05
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Inclusion
Action: Patch
AI Analysis

Impact

The Chronicle WordPress theme contains an improper control of filename in an include/require statement that allows an attacker to include local files through PHP's include functionality. This flaw is identified by CWE-98 and is rated with a CVSS score of 8.1, indicating a high severity level. The vulnerability permits the retrieval of arbitrary files from the server or the execution of arbitrary PHP code that resides locally, potentially exposing sensitive data or enabling further compromise.

Affected Systems

All installations of AncoraThemes’ Chronicle – Lifestyle Magazine & Blog WordPress Theme up to and including version 1.0 are affected. The issue is triggered whenever the theme's PHP files are invoked without proper sanitization of the include paths, regardless of user role or authentication state.

Risk and Exploitability

The EPSS score for this vulnerability is below 1%, suggesting a low probability of exploitation at present, and it is not included in the CISA Known Exploited Vulnerabilities catalog. Nevertheless, the high CVSS rating indicates that exploitation would have significant consequences if it were to occur. The likely attack vector is a publicly reachable web request that contains a manipulated parameter or URL fragment forcing the theme to include a file chosen by an attacker. No login or special privileges are required, so all visitors to the site are at risk.

Generated by OpenCVE AI on April 16, 2026 at 12:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Chronicle theme to any version newer than 1.0 or apply the vendor’s patch that addresses the LFI flaw.
  • If an update is not feasible, modify the theme’s PHP files to employ a strict whitelist of permissible include paths and remove any user-controlled input from the include statement.
  • Harden the server configuration by ensuring theme files are readable only by the web server, disabling risky PHP functions such as allow_url_include, and applying appropriate file permissions to prevent unintended file disclosure.

Generated by OpenCVE AI on April 16, 2026 at 12:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ancorathemes
Ancorathemes chronicle - Lifestyle Magazine & Blog Wordpress Theme
Wordpress
Wordpress wordpress
Vendors & Products Ancorathemes
Ancorathemes chronicle - Lifestyle Magazine & Blog Wordpress Theme
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Chronicle - Lifestyle Magazine & Blog WordPress Theme chronicle allows PHP Local File Inclusion.This issue affects Chronicle - Lifestyle Magazine & Blog WordPress Theme: from n/a through <= 1.0.
Title WordPress Chronicle - Lifestyle Magazine & Blog WordPress Theme theme <= 1.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Ancorathemes Chronicle - Lifestyle Magazine & Blog Wordpress Theme
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:08.484Z

Reserved: 2026-02-19T09:51:35.296Z

Link: CVE-2026-27337

cve-icon Vulnrichment

Updated: 2026-03-09T13:02:29.245Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:24.237

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-27337

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:45:35Z

Weaknesses