Cyber Posture

CVE-2026-27335

High

Published: 05 March 2026

Published
05 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 37.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Ekoterra - NonProfit, Green Energy & Ecology Theme ekoterra allows PHP Local File Inclusion.This issue affects Ekoterra - NonProfit, Green Energy & Ecology…

more

Theme: from n/a through <= 1.0.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the PHP Local File Inclusion flaw in the Ekoterra WordPress theme to eliminate the vulnerability.

prevent

Mandates validation of filename inputs at system entry points to block improper use in PHP include/require statements, directly preventing LFI exploitation.

detect

Provides vulnerability scanning to identify the PHP LFI vulnerability in Ekoterra theme installations for subsequent remediation.

Security SummaryAI

CVE-2026-27335 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as PHP Local File Inclusion (CWE-98), affecting the Ekoterra WordPress theme developed by AncoraThemes for NonProfit, Green Energy & Ecology sites. The flaw exists in versions from n/a through 1.0.0, where inadequate validation of filenames in PHP include/require statements allows attackers to include local files. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to potential for significant impacts across confidentiality, integrity, and availability.

Unauthenticated attackers can exploit this over the network with high attack complexity and no user interaction required. Successful exploitation enables reading sensitive local files, potentially leading to disclosure of configuration data, source code, or other server files, and in some cases escalating to remote code execution if controllable files are included. The high impacts reflect the potential for data theft, modification, or denial of service on vulnerable WordPress installations running the affected theme.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/ekoterra/vulnerability/wordpress-ekoterra-nonprofit-green-energy-ecology-theme-theme-1-0-0-local-file-inclusion-vulnerability?_s_id=cve documents the vulnerability, recommending theme updates beyond version 1.0.0 where available or removal of the theme as primary mitigations to prevent exploitation.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a local file inclusion (LFI) in a public-facing WordPress theme, enabling unauthenticated remote exploitation for sensitive data disclosure and potential arbitrary code execution, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References