Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22375: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Impacto Patronus

0
High
VulnerabilityCVE-2026-22375cvecve-2026-22375
Published: Fri Feb 20 2026 (02/20/2026, 15:47:05 UTC)
Source: CVE Database V5
Vendor/Project: AncoraThemes
Product: Impacto Patronus

Description

CVE-2026-22375 is a vulnerability in the AncoraThemes Impacto Patronus WordPress theme, allowing improper control of filenames in PHP include/require statements. This flaw enables PHP Local File Inclusion (LFI), potentially allowing attackers to include and execute arbitrary files on the server. The vulnerability affects Impacto Patronus versions up to and including 1. 2. 3. Exploitation does not require known exploits in the wild yet, but the risk remains significant due to the nature of LFI vulnerabilities. Attackers could leverage this to disclose sensitive information, execute malicious code, or escalate privileges. Organizations using this theme on their WordPress sites are at risk, especially if the theme is not updated or patched. Mitigation involves updating to a fixed version once available, restricting file inclusion paths, and employing web application firewalls. Countries with high WordPress usage and significant AncoraThemes market penetration are most at risk.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:55:09 UTC

Technical Analysis

CVE-2026-22375 identifies a Local File Inclusion (LFI) vulnerability in the AncoraThemes Impacto Patronus WordPress theme, specifically caused by improper control over the filename parameter used in PHP include or require statements. This vulnerability allows an attacker to manipulate the filename parameter to include arbitrary files from the server, potentially leading to remote code execution or disclosure of sensitive information. The flaw exists in versions up to and including 1.2.3 of the Impacto Patronus theme. The vulnerability arises because the application fails to properly sanitize or validate user-supplied input before passing it to PHP's include or require functions, which are used to incorporate files during runtime. Exploiting this vulnerability typically involves sending crafted HTTP requests that specify malicious file paths, enabling attackers to read sensitive files such as configuration files, password files, or even execute malicious scripts if writable files are included. Although no public exploits have been reported yet, the vulnerability is critical due to the potential impact on confidentiality, integrity, and availability of affected systems. The lack of a CVSS score necessitates an expert severity assessment, which rates this vulnerability as high severity. This is due to the ease of exploitation without authentication or user interaction, the broad impact on any site using the affected theme, and the potential for severe consequences including full system compromise. The vulnerability was publicly disclosed in February 2026, with no official patches currently available, emphasizing the need for immediate mitigation.

Potential Impact

The impact of CVE-2026-22375 on organizations worldwide can be significant, especially for those using the AncoraThemes Impacto Patronus WordPress theme. Successful exploitation can lead to unauthorized disclosure of sensitive information, such as configuration files containing database credentials or API keys, which can further facilitate deeper network compromise. Additionally, attackers may execute arbitrary PHP code by including malicious files, potentially gaining full control over the web server and pivoting to other internal systems. This can result in data breaches, defacement of websites, service disruption, and reputational damage. Since WordPress powers a large portion of websites globally, and AncoraThemes is a known theme provider, the scope of affected systems could be substantial. The vulnerability does not require authentication or user interaction, increasing the risk of automated exploitation attempts. Organizations with public-facing WordPress sites using this theme are at high risk, and failure to address this vulnerability could lead to significant operational and financial consequences.

Mitigation Recommendations

To mitigate CVE-2026-22375, organizations should take the following specific actions: 1) Immediately audit all WordPress sites for the use of the AncoraThemes Impacto Patronus theme, particularly versions up to 1.2.3. 2) If an official patch or updated version is released by AncoraThemes, apply it promptly. 3) In the absence of a patch, implement web application firewall (WAF) rules to block requests containing suspicious file inclusion patterns or attempts to manipulate include parameters. 4) Harden PHP configurations by disabling dangerous functions such as allow_url_include and restricting include_path to trusted directories only. 5) Employ strict input validation and sanitization on any user-controllable parameters related to file inclusion. 6) Monitor web server logs for unusual requests targeting include or require parameters and investigate anomalies. 7) Consider temporarily disabling or replacing the vulnerable theme with a secure alternative until a fix is available. 8) Conduct regular security assessments and penetration testing focused on file inclusion vulnerabilities. These targeted measures go beyond generic advice by focusing on the specific nature of this vulnerability and the affected product.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-07T12:21:36.721Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998ca02be58cf853bab9344

Added to database: 2/20/2026, 8:54:26 PM

Last enriched: 2/20/2026, 9:55:09 PM

Last updated: 2/21/2026, 3:57:40 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats