CVE-2026-22362
Published: 20 February 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through <= 1.0.3.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of filenames in PHP include/require statements to prevent local file inclusion by ensuring inputs do not enable arbitrary local file execution.
Mandates timely identification, reporting, and correction of the specific flaw in Photolia theme versions up to 1.0.3 through patching or removal.
Enforces secure configuration settings for PHP and web servers, such as restricting file access paths or disabling dangerous functions that could exacerbate LFI vulnerabilities.
Security SummaryAI
CVE-2026-22362 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and described as enabling PHP Local File Inclusion, in the Photolia WordPress theme developed by axiomthemes. This issue affects all versions of Photolia up to and including 1.0.3.
The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation is possible over the network by unauthenticated attackers (PR:N) with high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation can result in high impacts to confidentiality, integrity, and availability, potentially allowing attackers to include and execute arbitrary local files on the server.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/photolia/vulnerability/wordpress-photolia-theme-1-0-3-local-file-inclusion-vulnerability?_s_id=cve details this Local File Inclusion vulnerability in the WordPress Photolia theme version 1.0.3.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2026-22362 is a PHP Remote/Local File Inclusion vulnerability in a public-facing WordPress theme, directly enabling exploitation of a public-facing application for initial access.