CVE-2026-22366
Published: 20 February 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through <= 1.3.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the PHP Local File Inclusion by requiring validation of untrusted inputs used in filename controls for include/require statements.
Addresses the root cause of CVE-2026-22366 by establishing a process for timely remediation and patching of the vulnerable Jude WordPress theme.
Prevents exploitation by restricting filenames supplied to PHP include/require to only valid, safe values, blocking path traversal attempts.
Security SummaryAI
CVE-2026-22366 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the axiomthemes Jude WordPress theme in versions from n/a through 1.3.0. Published on 2026-02-20, it carries a CVSS 3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-98.
Unauthenticated attackers can exploit this vulnerability over the network with high attack complexity and no user interaction required. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, such as unauthorized access to local files via the inclusion mechanism.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/jude/vulnerability/wordpress-jude-theme-1-3-0-local-file-inclusion-vulnerability?_s_id=cve details this local file inclusion issue in the Jude theme version 1.3.0 and provides vulnerability information for mitigation.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in public-facing WordPress theme enables exploitation of public-facing application (T1190) and facilitates collection of data from local system files (T1005).