Impact
This vulnerability arises from improper validation of file names in PHP include/require statements within the Helion theme, allowing an attacker to manipulate the include path and read arbitrary local files on the server. This can expose configuration data, credentials, or other sensitive information, compromising confidentiality and integrity.
Affected Systems
Hosts running the Helion WordPress theme version 1.1.12 or earlier are affected. The issue is applicable to any WordPress installation that uses Helion v1.1.12 or earlier; no later versions are listed as vulnerable.
Risk and Exploitability
The CVSS score of 8.1 indicates a high severity vulnerability. An EPSS score of <1% suggests a very low but non-zero probability of exploitation in the field. The vulnerability is not listed in the CISA KEV catalog, indicating limited exploitation evidence. Attackers would likely attempt to supply crafted file paths via a URL or form input to trigger the inclusion, assuming they can reach the affected code path.
OpenCVE Enrichment