CVE-2026-24390
Published: 22 January 2026
Summary
CVE-2026-24390 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI in public-facing WordPress plugin directly enables exploitation of the application (T1190) by authenticated users and leads to RCE/privileges escalation (T1068).
NVD Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QantumThemes Kentha Elementor Widgets kentha-elementor allows PHP Local File Inclusion.This issue affects Kentha Elementor Widgets: from n/a through < 3.1.
Deeper analysisAI
CVE-2026-24390 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue but enabling PHP Local File Inclusion, affecting the Kentha Elementor Widgets WordPress plugin (kentha-elementor) developed by QantumThemes. The vulnerability impacts all versions from n/a through those prior to 3.1. It is associated with CWE-98 and carries a CVSS v3.1 base score of 7.5 (High), with the vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H.
The vulnerability can be exploited by low-privileged authenticated users (PR:L) over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope (S:U), potentially enabling local file inclusion to read sensitive files or execute arbitrary code via PHP includes.
Patchstack advisories indicate that updating to version 3.1 of the Kentha Elementor Widgets plugin mitigates the vulnerability, as it addresses the local file inclusion flaw in prior versions. Security practitioners should verify plugin updates through official WordPress repositories or the vendor and review the Patchstack database entry at https://patchstack.com/database/Wordpress/Plugin/kentha-elementor/vulnerability/wordpress-kentha-elementor-widgets-plugin-3-1-local-file-inclusion-vulnerability?_s_id=cve for additional details.
Details
- CWE(s)