Cyber Posture

CVE-2026-24390

High

Published: 22 January 2026

Published
22 January 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24390 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

LFI in public-facing WordPress plugin directly enables exploitation of the application (T1190) by authenticated users and leads to RCE/privileges escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QantumThemes Kentha Elementor Widgets kentha-elementor allows PHP Local File Inclusion.This issue affects Kentha Elementor Widgets: from n/a through < 3.1.

Deeper analysisAI

CVE-2026-24390 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified as a PHP Remote File Inclusion issue but enabling PHP Local File Inclusion, affecting the Kentha Elementor Widgets WordPress plugin (kentha-elementor) developed by QantumThemes. The vulnerability impacts all versions from n/a through those prior to 3.1. It is associated with CWE-98 and carries a CVSS v3.1 base score of 7.5 (High), with the vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H.

The vulnerability can be exploited by low-privileged authenticated users (PR:L) over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope (S:U), potentially enabling local file inclusion to read sensitive files or execute arbitrary code via PHP includes.

Patchstack advisories indicate that updating to version 3.1 of the Kentha Elementor Widgets plugin mitigates the vulnerability, as it addresses the local file inclusion flaw in prior versions. Security practitioners should verify plugin updates through official WordPress repositories or the vendor and review the Patchstack database entry at https://patchstack.com/database/Wordpress/Plugin/kentha-elementor/vulnerability/wordpress-kentha-elementor-widgets-plugin-3-1-local-file-inclusion-vulnerability?_s_id=cve for additional details.

Details

CWE(s)

CVEs Like This One

CVE-2026-22464Shared CWE-98
CVE-2025-23945Shared CWE-98
CVE-2026-1463Shared CWE-98
CVE-2026-41228Shared CWE-98
CVE-2026-32426Shared CWE-98
CVE-2025-27272Shared CWE-98
CVE-2025-53334Shared CWE-98
CVE-2025-53567Shared CWE-98
CVE-2025-14475Shared CWE-98
CVE-2025-69076Shared CWE-98

References