Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22367: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Coworking

0
High
VulnerabilityCVE-2026-22367cvecve-2026-22367
Published: Fri Feb 20 2026 (02/20/2026, 15:47:03 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Coworking

Description

CVE-2026-22367 is a Remote File Inclusion (RFI) vulnerability affecting AncoraThemes Coworking plugin versions up to 1. 6. 1. The vulnerability arises from improper control of filenames used in PHP include/require statements, allowing attackers to include and execute remote or local files. This can lead to arbitrary code execution, data disclosure, or full system compromise. Although no known exploits are currently reported in the wild, the flaw poses a significant risk if exploited. The vulnerability affects websites using the AncoraThemes Coworking plugin, commonly deployed in WordPress environments. Mitigation requires updating to a patched version once available or applying manual code fixes to validate and sanitize input controlling file inclusion. Countries with high WordPress usage and significant deployment of AncoraThemes products, such as the United States, Germany, and Brazil, are at greater risk. Given the potential for remote code execution without authentication, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:54:08 UTC

Technical Analysis

CVE-2026-22367 is a Local File Inclusion (LFI) vulnerability found in the AncoraThemes Coworking WordPress theme, affecting versions up to and including 1.6.1. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary local files on the web server. This can lead to disclosure of sensitive files such as configuration files, password files, or application source code, and potentially enable remote code execution if combined with other vulnerabilities or writable files. The issue is classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' a common weakness that can lead to serious security breaches. Although no public exploits have been reported yet, the vulnerability is publicly disclosed and unpatched at the time of reporting. The affected product, AncoraThemes Coworking, is a WordPress theme used primarily by coworking space websites, which may contain sensitive business and user data. The lack of a CVSS score requires an independent severity assessment. The vulnerability does not require authentication, and exploitation can be performed remotely by sending crafted requests to the vulnerable PHP scripts. The scope includes any website running the affected theme version, making it a significant risk for organizations relying on this theme. The absence of official patches or mitigations at the time of disclosure increases the urgency for administrators to apply temporary mitigations or monitor for suspicious activity.

Potential Impact

The impact of CVE-2026-22367 can be severe for organizations using the vulnerable AncoraThemes Coworking theme. Successful exploitation allows attackers to read arbitrary files on the server, potentially exposing sensitive information such as database credentials, configuration files, or user data. This can lead to further attacks including privilege escalation, data theft, or website defacement. In some cases, attackers may chain this vulnerability with others to achieve remote code execution, resulting in full server compromise. The availability of the affected theme across coworking space websites worldwide means that multiple organizations could be targeted, especially those that have not updated or patched their themes. The confidentiality and integrity of data hosted on affected sites are at risk, and the reputation of organizations could be damaged if customer data is leaked or services are disrupted. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks. The lack of known exploits currently limits immediate widespread impact, but the public disclosure increases the risk of future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2026-22367, organizations should first verify if they are using the AncoraThemes Coworking theme version 1.6.1 or earlier. Immediate steps include: 1) Applying any official patches or updates released by AncoraThemes as soon as they become available. 2) If no patch is available, manually review and harden the PHP code responsible for including files by implementing strict input validation and sanitization to ensure only intended files can be included. 3) Restrict file include paths using PHP configuration directives such as open_basedir to limit accessible directories. 4) Employ Web Application Firewalls (WAFs) to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities. 5) Monitor web server logs for unusual access patterns or attempts to include unexpected files. 6) Regularly back up website data and configurations to enable quick recovery in case of compromise. 7) Educate development and operations teams about secure coding practices to prevent similar vulnerabilities. These measures will reduce the risk of exploitation until a permanent fix is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-07T12:21:29.301Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998ca00be58cf853bab9221

Added to database: 2/20/2026, 8:54:24 PM

Last enriched: 2/20/2026, 9:54:08 PM

Last updated: 2/20/2026, 10:00:42 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats