Impact
The vulnerability arises from improper handling of filenames used in PHP include/require statements, allowing an attacker to manipulate the file path in a way that the server includes local files. This flaw can expose sensitive server files or, if an attacker supplies a crafted file containing executable code, it may lead to arbitrary remote code execution. The weakness is categorized as CWE‑98.
Affected Systems
ThemeREX Ozisti is affected in all releases up to version 1.1.10. The vulnerability applies to any WordPress installation using this theme within the stated version range.
Risk and Exploitability
The flaw carries a CVSS score of 8.1, indicating high severity. However, the EPSS score is under 1%, suggesting a very low probability of exploitation at present. The deficiency is not listed in the CISA KEV catalog. Attackers would need to find a way to supply a malicious file path to an included PHP instruction, likely via an input field or URL parameter that the theme uses without proper validation.
OpenCVE Enrichment