Cyber Posture

CVE-2026-22408

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Justicia justicia allows PHP Local File Inclusion.This issue affects Justicia: from n/a through <= 1.2.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the PHP Local File Inclusion flaw in the Justicia WordPress theme by identifying, patching, and testing the vulnerable include/require statements.

prevent

Validates and sanitizes user-supplied filenames and paths used in PHP include/require to block arbitrary local file inclusion.

prevent

Enforces secure PHP configuration settings such as open_basedir restrictions to limit file access scope and mitigate LFI exploitation.

Security SummaryAI

CVE-2026-22408 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion and mapped to CWE-98, in the Justicia WordPress theme by Mikado-Themes. The flaw enables PHP Local File Inclusion and affects all versions from n/a through 1.2. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-05T06:16:14.620.

A network-based attacker requires no privileges or user interaction but must overcome high attack complexity to exploit the vulnerability remotely. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing local file inclusion that could expose sensitive server files or facilitate further compromise.

The Patchstack advisory (https://patchstack.com/database/Wordpress/Theme/justicia/vulnerability/wordpress-justicia-theme-1-2-local-file-inclusion-vulnerability?_s_id=cve) details the Local File Inclusion issue in Justicia theme version 1.2 and provides guidance on associated patches or mitigations.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

T1190: Exploit Public-Facing Application via LFI/RFI in WordPress theme. T1005: Data from Local System enabled by local file inclusion for reading sensitive local files.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References