CVE-2026-22435
Published: 05 March 2026
Summary
CVE-2026-22435 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper filename control by requiring validation of user-supplied inputs to PHP include/require statements, preventing local file inclusion exploitation.
Mitigates the specific flaw in ElectroServ theme versions through <=1.3.2 by identifying, reporting, and applying timely patches or remediations.
Enforces secure PHP configuration settings like open_basedir restrictions to limit file system access even if flawed include logic is exploited.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote exploitation of public-facing WordPress theme vulnerability (T1190) via LFI enables reading sensitive data from the local file system (T1005).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes ElectroServ electroserv allows PHP Local File Inclusion.This issue affects ElectroServ: from n/a through <= 1.3.2.
Deeper analysisAI
CVE-2026-22435 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, described as PHP Remote File Inclusion but enabling PHP Local File Inclusion, affecting the ElectroServ WordPress theme by AncoraThemes. The issue impacts versions from unknown starting point through 1.3.2. Published on 2026-03-05T06:16:17.663, it carries a CVSS v3.1 base score of 8.1 (High) with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H and is associated with CWE-98.
Unauthenticated remote attackers can exploit this vulnerability over the network with no privileges or user interaction required, though it demands high attack complexity. Successful exploitation results in high impacts on confidentiality, integrity, and availability.
The Patchstack advisory provides details on this WordPress theme vulnerability, available at https://patchstack.com/database/Wordpress/Theme/electroserv/vulnerability/wordpress-electroserv-theme-1-3-2-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)