Cyber Posture

CVE-2026-22415

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes The Mounty the-mounty allows PHP Local File Inclusion.This issue affects The Mounty: from n/a through <= 1.1.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of filename inputs to PHP include/require statements, preventing local file inclusion by rejecting improper filenames.

prevent

Ensures timely identification, reporting, and correction of the specific LFI flaw in the WordPress theme The Mounty.

detect

Provides vulnerability scanning to identify the LFI vulnerability in the theme, enabling proactive remediation before exploitation.

Security SummaryAI

CVE-2026-22415 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as enabling PHP Local File Inclusion (despite the PHP Remote File Inclusion classification), in the WordPress theme The Mounty developed by AncoraThemes. This issue affects all versions of The Mounty from n/a through 1.1. It is associated with CWE-98 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility and significant impacts on confidentiality, integrity, and availability.

Unauthenticated remote attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows attackers to perform local file inclusion, potentially leading to high-level compromise of confidentiality by reading sensitive files, integrity violations through code execution or modification, and availability disruptions.

Mitigation details are available in advisories such as the Patchstack database entry at https://patchstack.com/database/Wordpress/Theme/the-mounty/vulnerability/wordpress-the-mounty-theme-1-1-local-file-inclusion-vulnerability?_s_id=cve. The vulnerability was published on 2026-03-05T06:16:15.310.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

LFI in public-facing WordPress theme enables remote exploitation (T1190) and arbitrary local file inclusion for data from local system (T1005), file discovery (T1083), and credentials in files like wp-config.php (T1552.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References