Cyber Posture

CVE-2026-22506

High

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Amoli amoli allows PHP Local File Inclusion.This issue affects Amoli: from n/a through <= 1.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper control of filenames in PHP include/require by enforcing validation of user-supplied inputs to block malicious local file paths.

prevent

Restricts filename inputs to only explicitly permitted safe values, preventing local file inclusion via untrusted paths in the Amoli WordPress theme.

prevent

Ensures timely patching or upgrading of the vulnerable Amoli theme versions to remediate the PHP LFI flaw.

Security SummaryAI

CVE-2026-22506 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Remote File Inclusion but enabling PHP Local File Inclusion, in the Elated-Themes Amoli WordPress theme. This issue affects Amoli versions from n/a through 1.0, as documented in the CVE description published on 2026-03-25.

The vulnerability carries a CVSS 3.1 score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation is possible over the network by unauthenticated attackers without user interaction, though it requires high attack complexity. Successful attacks can achieve high impacts on confidentiality, integrity, and availability, potentially allowing attackers to include and execute local files on the server via PHP.

Advisories, including the Patchstack database entry at https://patchstack.com/database/Wordpress/Theme/amoli/vulnerability/wordpress-amoli-theme-1-0-local-file-inclusion-vulnerability?_s_id=cve, detail the local file inclusion vulnerability specific to the Amoli WordPress theme version 1.0 and associated CWE-98.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote Local File Inclusion vulnerability in a public-facing WordPress theme directly enables exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References