CVE-2026-22452
Published: 05 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Hoverex hoverex allows PHP Local File Inclusion.This issue affects Hoverex: from n/a through <= 1.5.10.
Mitigating Controls (NIST 800-53 r5)AI
Directly validates user-supplied filenames in PHP include/require statements to block malicious local file inclusion paths exploited by this CVE.
Remediates the specific flaw in the Hoverex WordPress theme versions up to 1.5.10 by identifying, patching, and testing updates.
Restricts filenames accepted by PHP include/require to whitelisted safe paths, preventing arbitrary local file access via this vulnerability.
Security SummaryAI
CVE-2026-22452 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the ThemeREX Hoverex WordPress theme. This flaw affects Hoverex versions from n/a through 1.5.10 and is associated with CWE-98.
The vulnerability carries a CVSS v3.1 base score of 8.1 (High), with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction needed (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Remote attackers can exploit it to perform local file inclusion, potentially allowing them to access or execute arbitrary local files on the server.
The Patchstack advisory documents this local file inclusion vulnerability specifically in Hoverex theme version 1.5.10 for WordPress, providing details on the issue in their vulnerability database.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Public-facing WordPress theme vulnerability enables remote exploitation (T1190). LFI directly facilitates accessing sensitive data from local system files (T1005).