CVE-2026-22428
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Tooth Fairy tooth-fairy allows PHP Local File Inclusion.This issue affects Tooth Fairy: from n/a through <= 1.16.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the improper filename control flaw in the Tooth Fairy WordPress theme by identifying, reporting, and applying patches or updates to vulnerable versions up to 1.16.
Validates filenames and paths used in PHP include/require statements to block malicious local file inclusion via path traversal or manipulation.
Enforces secure PHP configuration settings such as open_basedir restrictions and disabling URL wrappers to prevent unauthorized file inclusion regardless of flawed application logic.
Security SummaryAI
CVE-2026-22428 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (CWE-98), affecting the Tooth Fairy WordPress theme developed by AncoraThemes. The vulnerability impacts all versions of the theme from n/a through 1.16 inclusive. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to potential for significant confidentiality, integrity, and availability impacts.
Remote attackers without privileges can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows inclusion of local files via manipulated include/require statements in the PHP code, potentially leading to arbitrary code execution, data disclosure, modification of system files, or denial of service, aligning with the high impact ratings across confidentiality, integrity, and availability.
Patchstack has documented this vulnerability in its database for the WordPress Tooth Fairy theme version 1.16, providing details that security practitioners can reference for mitigation guidance, such as updating to a patched version if available or applying workarounds to sanitize file inclusion paths.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of public-facing WordPress theme application (T1190) via improper filename control in PHP include/require, allowing LFI for unauthorized access to and collection of sensitive data from local system files (T1005).