Cyber Posture

CVE-2026-22428

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Tooth Fairy tooth-fairy allows PHP Local File Inclusion.This issue affects Tooth Fairy: from n/a through <= 1.16.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the improper filename control flaw in the Tooth Fairy WordPress theme by identifying, reporting, and applying patches or updates to vulnerable versions up to 1.16.

prevent

Validates filenames and paths used in PHP include/require statements to block malicious local file inclusion via path traversal or manipulation.

prevent

Enforces secure PHP configuration settings such as open_basedir restrictions and disabling URL wrappers to prevent unauthorized file inclusion regardless of flawed application logic.

Security SummaryAI

CVE-2026-22428 is an Improper Control of Filename for Include/Require Statement vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (CWE-98), affecting the Tooth Fairy WordPress theme developed by AncoraThemes. The vulnerability impacts all versions of the theme from n/a through 1.16 inclusive. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to potential for significant confidentiality, integrity, and availability impacts.

Remote attackers without privileges can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation allows inclusion of local files via manipulated include/require statements in the PHP code, potentially leading to arbitrary code execution, data disclosure, modification of system files, or denial of service, aligning with the high impact ratings across confidentiality, integrity, and availability.

Patchstack has documented this vulnerability in its database for the WordPress Tooth Fairy theme version 1.16, providing details that security practitioners can reference for mitigation guidance, such as updating to a patched version if available or applying workarounds to sanitize file inclusion paths.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

CVE enables exploitation of public-facing WordPress theme application (T1190) via improper filename control in PHP include/require, allowing LFI for unauthorized access to and collection of sensitive data from local system files (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References