Impact
The CVE describes an improper control of filename for the include/require statement in the Notarius theme that allows an attacker to include arbitrary local files. An attacker who can craft a request that influences the include path could read sensitive files on the server, and, if the included file contains PHP code, execute it, potentially leading to remote code execution or disclosure of confidential data.
Affected Systems
This weakness is present in the AncoraThemes Notarius WordPress theme on all versions up to and including 1.9. WordPress installations that have any of these versions deployed are vulnerable.
Risk and Exploitability
The CVSS base score of 8.1 classifies the issue as high severity. The EPSS score of less than 1% suggests a low current probability of exploitation, and the vulnerability is not listed in the CISA KEV catalogue. However, once a path to provide a filename argument is discovered, the attacker can include files without authentication. The attack would most likely be performed by manipulating a URL or form parameter that is fed to an include/require call in the theme code.
OpenCVE Enrichment