CVE-2026-22367: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Coworking
CVE-2026-22367 is a Remote File Inclusion (RFI) vulnerability affecting AncoraThemes Coworking plugin versions up to 1. 6. 1. The vulnerability arises from improper control of filenames used in PHP include/require statements, allowing attackers to include and execute remote or local files. This can lead to arbitrary code execution, data disclosure, or full system compromise. Although no known exploits are currently reported in the wild, the flaw poses a significant risk if exploited. The vulnerability affects websites using the AncoraThemes Coworking plugin, commonly deployed in WordPress environments. Mitigation requires updating to a patched version once available or applying manual code fixes to validate and sanitize input controlling file inclusion. Countries with high WordPress usage and significant deployment of AncoraThemes products, such as the United States, Germany, and Brazil, are at greater risk. Given the potential for remote code execution without authentication, the severity is assessed as high.
AI Analysis
Technical Summary
CVE-2026-22367 is a Local File Inclusion (LFI) vulnerability found in the AncoraThemes Coworking WordPress theme, affecting versions up to and including 1.6.1. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary local files on the web server. This can lead to disclosure of sensitive files such as configuration files, password files, or application source code, and potentially enable remote code execution if combined with other vulnerabilities or writable files. The issue is classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' a common weakness that can lead to serious security breaches. Although no public exploits have been reported yet, the vulnerability is publicly disclosed and unpatched at the time of reporting. The affected product, AncoraThemes Coworking, is a WordPress theme used primarily by coworking space websites, which may contain sensitive business and user data. The lack of a CVSS score requires an independent severity assessment. The vulnerability does not require authentication, and exploitation can be performed remotely by sending crafted requests to the vulnerable PHP scripts. The scope includes any website running the affected theme version, making it a significant risk for organizations relying on this theme. The absence of official patches or mitigations at the time of disclosure increases the urgency for administrators to apply temporary mitigations or monitor for suspicious activity.
Potential Impact
The impact of CVE-2026-22367 can be severe for organizations using the vulnerable AncoraThemes Coworking theme. Successful exploitation allows attackers to read arbitrary files on the server, potentially exposing sensitive information such as database credentials, configuration files, or user data. This can lead to further attacks including privilege escalation, data theft, or website defacement. In some cases, attackers may chain this vulnerability with others to achieve remote code execution, resulting in full server compromise. The availability of the affected theme across coworking space websites worldwide means that multiple organizations could be targeted, especially those that have not updated or patched their themes. The confidentiality and integrity of data hosted on affected sites are at risk, and the reputation of organizations could be damaged if customer data is leaked or services are disrupted. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks. The lack of known exploits currently limits immediate widespread impact, but the public disclosure increases the risk of future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2026-22367, organizations should first verify if they are using the AncoraThemes Coworking theme version 1.6.1 or earlier. Immediate steps include: 1) Applying any official patches or updates released by AncoraThemes as soon as they become available. 2) If no patch is available, manually review and harden the PHP code responsible for including files by implementing strict input validation and sanitization to ensure only intended files can be included. 3) Restrict file include paths using PHP configuration directives such as open_basedir to limit accessible directories. 4) Employ Web Application Firewalls (WAFs) to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities. 5) Monitor web server logs for unusual access patterns or attempts to include unexpected files. 6) Regularly back up website data and configurations to enable quick recovery in case of compromise. 7) Educate development and operations teams about secure coding practices to prevent similar vulnerabilities. These measures will reduce the risk of exploitation until a permanent fix is applied.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2026-22367: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Coworking
Description
CVE-2026-22367 is a Remote File Inclusion (RFI) vulnerability affecting AncoraThemes Coworking plugin versions up to 1. 6. 1. The vulnerability arises from improper control of filenames used in PHP include/require statements, allowing attackers to include and execute remote or local files. This can lead to arbitrary code execution, data disclosure, or full system compromise. Although no known exploits are currently reported in the wild, the flaw poses a significant risk if exploited. The vulnerability affects websites using the AncoraThemes Coworking plugin, commonly deployed in WordPress environments. Mitigation requires updating to a patched version once available or applying manual code fixes to validate and sanitize input controlling file inclusion. Countries with high WordPress usage and significant deployment of AncoraThemes products, such as the United States, Germany, and Brazil, are at greater risk. Given the potential for remote code execution without authentication, the severity is assessed as high.
AI-Powered Analysis
Technical Analysis
CVE-2026-22367 is a Local File Inclusion (LFI) vulnerability found in the AncoraThemes Coworking WordPress theme, affecting versions up to and including 1.6.1. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary local files on the web server. This can lead to disclosure of sensitive files such as configuration files, password files, or application source code, and potentially enable remote code execution if combined with other vulnerabilities or writable files. The issue is classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' a common weakness that can lead to serious security breaches. Although no public exploits have been reported yet, the vulnerability is publicly disclosed and unpatched at the time of reporting. The affected product, AncoraThemes Coworking, is a WordPress theme used primarily by coworking space websites, which may contain sensitive business and user data. The lack of a CVSS score requires an independent severity assessment. The vulnerability does not require authentication, and exploitation can be performed remotely by sending crafted requests to the vulnerable PHP scripts. The scope includes any website running the affected theme version, making it a significant risk for organizations relying on this theme. The absence of official patches or mitigations at the time of disclosure increases the urgency for administrators to apply temporary mitigations or monitor for suspicious activity.
Potential Impact
The impact of CVE-2026-22367 can be severe for organizations using the vulnerable AncoraThemes Coworking theme. Successful exploitation allows attackers to read arbitrary files on the server, potentially exposing sensitive information such as database credentials, configuration files, or user data. This can lead to further attacks including privilege escalation, data theft, or website defacement. In some cases, attackers may chain this vulnerability with others to achieve remote code execution, resulting in full server compromise. The availability of the affected theme across coworking space websites worldwide means that multiple organizations could be targeted, especially those that have not updated or patched their themes. The confidentiality and integrity of data hosted on affected sites are at risk, and the reputation of organizations could be damaged if customer data is leaked or services are disrupted. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks. The lack of known exploits currently limits immediate widespread impact, but the public disclosure increases the risk of future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2026-22367, organizations should first verify if they are using the AncoraThemes Coworking theme version 1.6.1 or earlier. Immediate steps include: 1) Applying any official patches or updates released by AncoraThemes as soon as they become available. 2) If no patch is available, manually review and harden the PHP code responsible for including files by implementing strict input validation and sanitization to ensure only intended files can be included. 3) Restrict file include paths using PHP configuration directives such as open_basedir to limit accessible directories. 4) Employ Web Application Firewalls (WAFs) to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities. 5) Monitor web server logs for unusual access patterns or attempts to include unexpected files. 6) Regularly back up website data and configurations to enable quick recovery in case of compromise. 7) Educate development and operations teams about secure coding practices to prevent similar vulnerabilities. These measures will reduce the risk of exploitation until a permanent fix is applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-01-07T12:21:29.301Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6998ca00be58cf853bab9221
Added to database: 2/20/2026, 8:54:24 PM
Last enriched: 2/20/2026, 9:54:08 PM
Last updated: 2/20/2026, 10:00:42 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2858: Out-of-Bounds Read in wren-lang wren
MediumCVE-2026-27120: CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in vapor leaf-kit
MediumCVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
MediumCVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo
CriticalCVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.