CVE-2026-22372
Published: 20 February 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through <= 1.4.2.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates information input validation at system entry points, directly preventing malicious filenames from exploiting improper control in PHP include/require statements leading to local file inclusion.
SI-2 requires timely flaw remediation, directly addressing the specific PHP LFI vulnerability in Isida WordPress theme versions through <=1.4.2 by applying patches.
CM-6 enforces secure configuration settings like PHP open_basedir restrictions or disabled functions, limiting the scope of local file inclusion attacks.
Security SummaryAI
CVE-2026-22372 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion, affecting the Isida WordPress theme developed by AncoraThemes. The vulnerability impacts Isida versions from n/a through 1.4.2 and was published on 2026-02-20. It is associated with CWE-98 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, high confidentiality/integrity/availability impacts, despite requiring high attack complexity.
Remote unauthenticated attackers can exploit this vulnerability over the network without user interaction or privileges. Successful exploitation allows attackers to perform local file inclusion, potentially leading to high-impact outcomes such as unauthorized access to sensitive data, modification of files, or system disruption.
The Patchstack advisory provides details on this WordPress Isida theme vulnerability, available at https://patchstack.com/database/Wordpress/Theme/isida/vulnerability/wordpress-isida-theme-1-4-2-local-file-inclusion-vulnerability?_s_id=cve, which security practitioners should consult for mitigation guidance and patches.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an improper filename control in a PHP include/require statement in a public-facing WordPress theme, classified as a remote/local file inclusion flaw exploitable over the network without privileges, directly enabling T1190 (Exploit Public-Facing Application).