CVE-2026-22373: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Fooddy
CVE-2026-22373 is a vulnerability in AncoraThemes Fooddy (version <= 1. 3. 10) involving improper control of filenames in PHP include/require statements, leading to a Local File Inclusion (LFI) issue. This flaw allows attackers to include and execute arbitrary local files on the server, potentially exposing sensitive data or enabling further exploitation. No known public exploits currently exist, but the vulnerability poses significant risks if exploited. It affects websites using the Fooddy theme, commonly deployed in WordPress environments. Exploitation requires the attacker to manipulate input that controls file inclusion without proper validation. Mitigation involves applying patches when available, restricting file inclusion paths, and implementing strict input validation. Countries with high WordPress usage and significant AncoraThemes adoption are at greater risk. The severity is assessed as high due to the potential impact on confidentiality and integrity, ease of exploitation, and broad scope of affected systems.
AI Analysis
Technical Summary
CVE-2026-22373 is a Local File Inclusion (LFI) vulnerability found in the AncoraThemes Fooddy WordPress theme versions up to 1.3.10. The vulnerability stems from improper control over the filename parameter used in PHP include or require statements. Specifically, the theme fails to adequately validate or sanitize user input that determines which files are included during execution. This flaw allows an attacker to manipulate the input to include arbitrary local files from the server's filesystem. Exploiting this vulnerability can lead to disclosure of sensitive files such as configuration files, password files, or other critical data stored on the server. In some cases, it may also enable remote code execution if the attacker can upload malicious files or leverage other chained vulnerabilities. The vulnerability does not currently have a CVSS score and no known exploits have been reported in the wild. However, given the nature of LFI vulnerabilities and their common exploitation in web applications, this issue represents a serious security risk. The affected product, Fooddy, is a WordPress theme developed by AncoraThemes, used primarily for food-related websites. The vulnerability was reserved in early January 2026 and published in February 2026. No official patches or updates have been linked yet, so users must monitor vendor advisories closely. The vulnerability is categorized under improper input validation in PHP file inclusion mechanisms, a common and critical web application security issue.
Potential Impact
The impact of CVE-2026-22373 can be significant for organizations using the vulnerable Fooddy theme. Successful exploitation can lead to unauthorized disclosure of sensitive information, including server configuration files, database credentials, and other critical data stored locally. This can facilitate further attacks such as privilege escalation, remote code execution, or lateral movement within the network. For websites, this may result in defacement, data breaches, or complete server compromise. Small and medium-sized businesses relying on WordPress themes like Fooddy may face reputational damage, financial losses, and regulatory penalties if customer data is exposed. The vulnerability also increases the attack surface for automated scanning and exploitation by threat actors. Since the flaw is in a widely used CMS theme, the scope of affected systems could be broad, especially if the theme is popular in certain regions or industries. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks. Organizations with public-facing websites running this theme are particularly at risk, as attackers can remotely attempt to exploit the vulnerability without authentication or user interaction.
Mitigation Recommendations
To mitigate CVE-2026-22373, organizations should first check if they are using the AncoraThemes Fooddy theme version 1.3.10 or earlier and upgrade to a patched version once available. In the absence of an official patch, users should implement the following specific mitigations: 1) Disable or restrict PHP file inclusion functions in the web server or PHP configuration where possible, using directives like open_basedir to limit accessible directories. 2) Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file inclusion attempts targeting the vulnerable parameters. 3) Conduct thorough input validation and sanitization on any user-supplied data used in file inclusion, ensuring only expected and safe filenames are accepted. 4) Restrict file permissions on the server to prevent unauthorized reading of sensitive files that could be included. 5) Monitor web server logs for unusual requests attempting to exploit file inclusion patterns. 6) Consider temporarily disabling the vulnerable theme or switching to a different theme until a secure update is released. 7) Educate developers and administrators about secure coding practices related to file inclusion to prevent similar vulnerabilities in custom code. These targeted actions go beyond generic advice and address the specific mechanics of this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Italy, Spain
CVE-2026-22373: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Fooddy
Description
CVE-2026-22373 is a vulnerability in AncoraThemes Fooddy (version <= 1. 3. 10) involving improper control of filenames in PHP include/require statements, leading to a Local File Inclusion (LFI) issue. This flaw allows attackers to include and execute arbitrary local files on the server, potentially exposing sensitive data or enabling further exploitation. No known public exploits currently exist, but the vulnerability poses significant risks if exploited. It affects websites using the Fooddy theme, commonly deployed in WordPress environments. Exploitation requires the attacker to manipulate input that controls file inclusion without proper validation. Mitigation involves applying patches when available, restricting file inclusion paths, and implementing strict input validation. Countries with high WordPress usage and significant AncoraThemes adoption are at greater risk. The severity is assessed as high due to the potential impact on confidentiality and integrity, ease of exploitation, and broad scope of affected systems.
AI-Powered Analysis
Technical Analysis
CVE-2026-22373 is a Local File Inclusion (LFI) vulnerability found in the AncoraThemes Fooddy WordPress theme versions up to 1.3.10. The vulnerability stems from improper control over the filename parameter used in PHP include or require statements. Specifically, the theme fails to adequately validate or sanitize user input that determines which files are included during execution. This flaw allows an attacker to manipulate the input to include arbitrary local files from the server's filesystem. Exploiting this vulnerability can lead to disclosure of sensitive files such as configuration files, password files, or other critical data stored on the server. In some cases, it may also enable remote code execution if the attacker can upload malicious files or leverage other chained vulnerabilities. The vulnerability does not currently have a CVSS score and no known exploits have been reported in the wild. However, given the nature of LFI vulnerabilities and their common exploitation in web applications, this issue represents a serious security risk. The affected product, Fooddy, is a WordPress theme developed by AncoraThemes, used primarily for food-related websites. The vulnerability was reserved in early January 2026 and published in February 2026. No official patches or updates have been linked yet, so users must monitor vendor advisories closely. The vulnerability is categorized under improper input validation in PHP file inclusion mechanisms, a common and critical web application security issue.
Potential Impact
The impact of CVE-2026-22373 can be significant for organizations using the vulnerable Fooddy theme. Successful exploitation can lead to unauthorized disclosure of sensitive information, including server configuration files, database credentials, and other critical data stored locally. This can facilitate further attacks such as privilege escalation, remote code execution, or lateral movement within the network. For websites, this may result in defacement, data breaches, or complete server compromise. Small and medium-sized businesses relying on WordPress themes like Fooddy may face reputational damage, financial losses, and regulatory penalties if customer data is exposed. The vulnerability also increases the attack surface for automated scanning and exploitation by threat actors. Since the flaw is in a widely used CMS theme, the scope of affected systems could be broad, especially if the theme is popular in certain regions or industries. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks. Organizations with public-facing websites running this theme are particularly at risk, as attackers can remotely attempt to exploit the vulnerability without authentication or user interaction.
Mitigation Recommendations
To mitigate CVE-2026-22373, organizations should first check if they are using the AncoraThemes Fooddy theme version 1.3.10 or earlier and upgrade to a patched version once available. In the absence of an official patch, users should implement the following specific mitigations: 1) Disable or restrict PHP file inclusion functions in the web server or PHP configuration where possible, using directives like open_basedir to limit accessible directories. 2) Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file inclusion attempts targeting the vulnerable parameters. 3) Conduct thorough input validation and sanitization on any user-supplied data used in file inclusion, ensuring only expected and safe filenames are accepted. 4) Restrict file permissions on the server to prevent unauthorized reading of sensitive files that could be included. 5) Monitor web server logs for unusual requests attempting to exploit file inclusion patterns. 6) Consider temporarily disabling the vulnerable theme or switching to a different theme until a secure update is released. 7) Educate developers and administrators about secure coding practices related to file inclusion to prevent similar vulnerabilities in custom code. These targeted actions go beyond generic advice and address the specific mechanics of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-01-07T12:21:29.302Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6998ca02be58cf853bab9341
Added to database: 2/20/2026, 8:54:26 PM
Last enriched: 2/20/2026, 9:54:55 PM
Last updated: 2/21/2026, 4:00:26 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65995: CWE-209 Generation of Error Message Containing Sensitive Information in Apache Software Foundation Apache Airflow
HighCVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.