Impact
This vulnerability arises from an improper control of the filename used in a PHP include or require statement within the Vixus WordPress theme. The flaw allows an attacker to manipulate the target file to be included, which can lead to the execution of arbitrary PHP code on the web server. The weakness is classified as a Local File Inclusion scenario, directly impacting confidentiality, integrity, and availability of the affected site.
Affected Systems
The affected product is the ThemeREX Vixus WordPress theme, versions through 1.0.16 inclusive. Any WordPress installation that has this theme installed without upgrade beyond the specified version is susceptible.
Risk and Exploitability
The CVSS score of 8.1 reflects high severity. The EPSS score of less than one percent indicates a low probability of exploitation at this stage, and it is not currently listed in the CISA KEV catalog. The lack of explicit authentication requirements in the description suggests that the attack could be carried out by an unauthenticated or local actor who can influence the theme’s file inclusion logic. Given these conditions, the risk is moderate but warrants timely remediation to prevent possible remote code execution.
OpenCVE Enrichment