Impact
An improper control of the filename in the PHP include/require statement in the CreativeWS Kiddy theme allows a local file to be included. This flaw can let an attacker read sensitive server files or execute arbitrary PHP code if the included file contains malicious content, compromising confidentiality, integrity, or availability of the WordPress site.
Affected Systems
The vulnerability affects all versions of the CreativeWS Kiddy theme from the first release through 2.0.8. Any WordPress installation using this theme in those versions is impacted; later releases are not vulnerable.
Risk and Exploitability
The CVSS score of 8.1 signals a high severity risk, while the EPSS score of less than 1% indicates a low likelihood of widespread exploitation at present; the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, occurring via a crafted HTTP request that triggers the uncontrolled include path, but the weakness is fundamentally a local file inclusion.
OpenCVE Enrichment