CVE-2026-22495
Published: 25 March 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Greenville greenville allows PHP Local File Inclusion.This issue affects Greenville: from n/a through <= 1.3.2.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the LFI vulnerability by requiring timely patching or updating of the vulnerable Greenville WordPress theme to versions beyond 1.3.2.
Requires validation of filenames passed to PHP include/require statements, preventing attackers from supplying malicious paths for local file inclusion.
Enforces restrictive configuration settings in PHP, such as open_basedir restrictions, to limit the scope of file access even if flawed include logic is exploited.
Security SummaryAI
CVE-2026-22495 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (LFI). It affects the Greenville WordPress theme developed by AncoraThemes, impacting all versions from n/a through 1.3.2.
Unauthenticated remote attackers (AV:N, PR:N, UI:N) can exploit this vulnerability over the network, though it requires high attack complexity (AC:H). Successful exploitation leads to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), with an overall CVSS v3.1 base score of 8.1, potentially allowing attackers to include and execute local files on the server.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/greenville/vulnerability/wordpress-greenville-theme-1-3-2-local-file-inclusion-vulnerability?_s_id=cve documents this LFI vulnerability specifically in Greenville theme version 1.3.2.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables remote exploitation of public-facing WordPress application (T1190) via LFI, facilitating collection of data from local system files (T1005) including unsecured credentials in configuration files (T1552.001).