Cyber Posture

CVE-2026-22452

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Hoverex hoverex allows PHP Local File Inclusion.This issue affects Hoverex: from n/a through <= 1.5.10.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates user-supplied filenames in PHP include/require statements to block malicious local file inclusion paths exploited by this CVE.

prevent

Remediates the specific flaw in the Hoverex WordPress theme versions up to 1.5.10 by identifying, patching, and testing updates.

prevent

Restricts filenames accepted by PHP include/require to whitelisted safe paths, preventing arbitrary local file access via this vulnerability.

Security SummaryAI

CVE-2026-22452 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the ThemeREX Hoverex WordPress theme. This flaw affects Hoverex versions from n/a through 1.5.10 and is associated with CWE-98.

The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction needed (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Remote attackers can exploit it to perform local file inclusion, potentially allowing them to access or execute arbitrary local files on the server.

The Patchstack advisory documents this local file inclusion vulnerability specifically in Hoverex theme version 1.5.10 for WordPress, providing details on the issue in their vulnerability database.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Public-facing WordPress theme vulnerability enables remote exploitation (T1190). LFI directly facilitates accessing sensitive data from local system files (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References