Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22370: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in axiomthemes Marveland

0
High
VulnerabilityCVE-2026-22370cvecve-2026-22370
Published: Fri Feb 20 2026 (02/20/2026, 15:47:03 UTC)
Source: CVE Database V5
Vendor/Project: axiomthemes
Product: Marveland

Description

CVE-2026-22370 is a high-severity vulnerability affecting the axiomthemes Marveland PHP application up to version 1. 3. 0. It involves improper control of filenames used in include or require statements, leading to a PHP Remote File Inclusion (RFI) vulnerability. This flaw allows an attacker to include and execute remote malicious PHP code on the affected server without authentication or user interaction. The vulnerability has a CVSS score of 8. 1, reflecting its potential to compromise confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the risk remains significant due to the ease of remote exploitation over the network. Organizations using the Marveland theme in their PHP environments should prioritize patching or applying mitigations to prevent remote code execution. Countries with significant usage of PHP-based web applications and WordPress themes, especially where axiomthemes products are popular, are at higher risk.

AI-Powered Analysis

AILast updated: 02/20/2026, 20:56:52 UTC

Technical Analysis

CVE-2026-22370 is a vulnerability classified as improper control of filename for include/require statements in the PHP program Marveland by axiomthemes, affecting versions up to 1.3.0. This vulnerability enables Remote File Inclusion (RFI), where an attacker can manipulate the filename parameter used in PHP's include or require functions to load and execute arbitrary remote PHP code. The root cause is insufficient validation or sanitization of user-controlled input that determines the file path to be included. Exploiting this vulnerability allows attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or service disruption. The CVSS 3.1 base score is 8.1, indicating high severity with network attack vector, high complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No patches or exploits are currently documented, but the vulnerability's nature makes it a critical risk for affected installations. The vulnerability primarily impacts PHP environments using the Marveland theme, commonly deployed in web servers running WordPress or similar CMS platforms.

Potential Impact

The impact of CVE-2026-22370 is severe for organizations running the Marveland PHP theme. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the affected web server. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized code or data modification, and availability by potentially causing denial of service or server crashes. Attackers could deploy backdoors, pivot within internal networks, or exfiltrate data. Given the remote, unauthenticated nature of the exploit, the threat extends to any publicly accessible web server using the vulnerable theme. This can affect organizations of all sizes, especially those relying on PHP-based CMS platforms for their web presence. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency to address the vulnerability.

Mitigation Recommendations

To mitigate CVE-2026-22370, organizations should first check for and apply any official patches or updates from axiomthemes for the Marveland product. If patches are not yet available, implement strict input validation and sanitization on all parameters used in include or require statements to ensure only safe, expected file paths are processed. Employ web application firewalls (WAFs) with rules to detect and block attempts to exploit file inclusion vulnerabilities. Disable allow_url_include in PHP configurations to prevent remote file inclusion. Restrict file permissions and isolate web server processes to limit the impact of any successful exploit. Regularly audit and monitor web server logs for suspicious activity related to file inclusion attempts. Additionally, consider using security plugins or modules that can detect and prevent RFI attacks in PHP environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-07T12:21:29.302Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998c9e1be58cf853bab6ac3

Added to database: 2/20/2026, 8:53:53 PM

Last enriched: 2/20/2026, 8:56:52 PM

Last updated: 2/21/2026, 6:25:31 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats