Impact
The vulnerability is an improper control of the filename used in PHP's include/require statements, which allows the inclusion of sensitive local files on the server. Based on the description, it is inferred that an attacker could read or potentially execute arbitrary local files through the vulnerable code path, thereby compromising confidentiality, integrity, or availability of the affected WordPress installation.
Affected Systems
The issue affects the ThemeREX Scientia WordPress theme in all releases up to and including version 1.2.4. Site administrators who are still using one of these releases are at risk; newer releases are not impacted according to the available data.
Risk and Exploitability
With a CVSS score of 8.1 the flaw is classified as high severity, yet the EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, indicating a low likelihood of widespread exploitation at present. The likely attack vector is a crafted web request that manipulates a file path parameter used by the theme, which is inferred from the type of LFI flaw and typical entry points in WordPress themes.
OpenCVE Enrichment