CVE-2026-22424
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Shaha shaha allows PHP Local File Inclusion.This issue affects Shaha: from n/a through <= 1.1.2.
Mitigating Controls (NIST 800-53 r5)AI
Requires timely installation of patches or updates for the vulnerable Shaha WordPress theme to eliminate the PHP Local File Inclusion flaw in CVE-2026-22424.
Mandates validation of user-supplied filenames prior to their use in PHP include/require statements, directly preventing exploitation of this improper filename control vulnerability.
Ensures monitoring and application of security advisories like the Patchstack alert for CVE-2026-22424 to identify and address the LFI vulnerability promptly.
Security SummaryAI
CVE-2026-22424 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the Shaha WordPress theme developed by AncoraThemes. The issue impacts all versions of Shaha from n/a through 1.1.2.
Attackers with network access can exploit this vulnerability despite high attack complexity, requiring no privileges or user interaction. Per the CVSS 3.1 score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), successful exploitation yields high impacts on confidentiality, integrity, and availability, mapped to CWE-98, potentially allowing inclusion of local files for data disclosure or further compromise.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/shaha/vulnerability/wordpress-shaha-theme-1-1-2-local-file-inclusion-vulnerability?_s_id=cve details this Local File Inclusion vulnerability in Shaha version 1.1.2 and serves as the primary reference for mitigation information.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a Local File Inclusion (LFI) in a public-facing WordPress theme, directly exploitable remotely without authentication to include and execute local files, mapping to T1190: Exploit Public-Facing Application.