Cyber Posture

CVE-2026-22433

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes CloudMe cloudme allows PHP Local File Inclusion.This issue affects CloudMe: from n/a through <= 1.2.2.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted filename inputs in PHP include/require statements to block local file inclusion exploits in the CloudMe theme.

prevent

Mandates timely identification, prioritization, and patching of the specific PHP file inclusion flaw affecting CloudMe versions through 1.2.2.

prevent

Enforces secure PHP configuration settings such as open_basedir restrictions and disabling allow_url_include to limit exploitable file paths for LFI attacks.

Security SummaryAI

CVE-2026-22433 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion, affecting the CloudMe WordPress theme developed by AncoraThemes. The vulnerability impacts CloudMe versions from n/a through 1.2.2 and is associated with CWE-98. It was published on 2026-03-05 with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers can exploit this vulnerability over the network without requiring privileges or user interaction, though it demands high attack complexity. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing attackers to include and potentially execute local files on the server, which could lead to sensitive data exposure or system compromise.

Advisories and mitigation guidance are detailed in the Patchstack reference at https://patchstack.com/database/Wordpress/Theme/cloudme/vulnerability/wordpress-cloudme-theme-1-2-2-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

LFI vulnerability in public-facing WordPress theme enables remote exploitation (T1190) and arbitrary local file reads (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References