Cyber Posture

CVE-2026-22464

High

Published: 22 January 2026

Published
22 January 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 17.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22464 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

LFI in public-facing WordPress plugin enables remote code execution from low-priv auth, mapping directly to public app exploitation and priv esc.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wphocus My auctions allegro my-auctions-allegro-free-edition allows PHP Local File Inclusion.This issue affects My auctions allegro: from n/a through <= 3.6.33.

Deeper analysisAI

CVE-2026-22464 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue that enables PHP Local File Inclusion (CWE-98). It affects the WordPress plugin "My auctions allegro" (my-auctions-allegro-free-edition) by wphocus, impacting all versions from n/a through 3.6.33. The vulnerability was published on 2026-01-22 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).

Exploitation requires low privileges (PR:L) and can be performed over the network (AV:N) with high attack complexity (AC:H) and no user interaction (UI:N). A successful attack results in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U), potentially allowing an authenticated low-privilege user to include and execute arbitrary local files on the server.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/my-auctions-allegro-free-edition/vulnerability/wordpress-my-auctions-allegro-plugin-3-6-33-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2025-23945Shared CWE-98
CVE-2026-24390Shared CWE-98
CVE-2026-1463Shared CWE-98
CVE-2026-41228Shared CWE-98
CVE-2026-32426Shared CWE-98
CVE-2025-27272Shared CWE-98
CVE-2025-53334Shared CWE-98
CVE-2025-53567Shared CWE-98
CVE-2025-14475Shared CWE-98
CVE-2025-69076Shared CWE-98

References