Cyber Posture

CVE-2026-22424

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Shaha shaha allows PHP Local File Inclusion.This issue affects Shaha: from n/a through <= 1.1.2.

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Requires timely installation of patches or updates for the vulnerable Shaha WordPress theme to eliminate the PHP Local File Inclusion flaw in CVE-2026-22424.

prevent

Mandates validation of user-supplied filenames prior to their use in PHP include/require statements, directly preventing exploitation of this improper filename control vulnerability.

detectrespond

Ensures monitoring and application of security advisories like the Patchstack alert for CVE-2026-22424 to identify and address the LFI vulnerability promptly.

Security SummaryAI

CVE-2026-22424 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the Shaha WordPress theme developed by AncoraThemes. The issue impacts all versions of Shaha from n/a through 1.1.2.

Attackers with network access can exploit this vulnerability despite high attack complexity, requiring no privileges or user interaction. Per the CVSS 3.1 score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), successful exploitation yields high impacts on confidentiality, integrity, and availability, mapped to CWE-98, potentially allowing inclusion of local files for data disclosure or further compromise.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/shaha/vulnerability/wordpress-shaha-theme-1-1-2-local-file-inclusion-vulnerability?_s_id=cve details this Local File Inclusion vulnerability in Shaha version 1.1.2 and serves as the primary reference for mitigation information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a Local File Inclusion (LFI) in a public-facing WordPress theme, directly exploitable remotely without authentication to include and execute local files, mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References