CVE-2026-22493
Received Received - Intake
Local File Inclusion Vulnerability in Elated-Themes Gaspard

Publication date: 2026-03-25

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Gaspard gaspard allows PHP Local File Inclusion.This issue affects Gaspard: from n/a through <= 1.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
elated-themes gaspard to 1.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-22493 is a Local File Inclusion (LFI) vulnerability found in the WordPress Gaspard Theme versions up to and including 1.3. This vulnerability allows unauthenticated attackers to manipulate the theme to include and display local files from the target website.

By exploiting this flaw, attackers can access sensitive information stored in local files, such as database credentials, which could lead to further compromise of the website.

This vulnerability is categorized under the OWASP Top 10 category A3: Injection, specifically as a Local File Inclusion issue.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to unauthorized disclosure of sensitive information, including database credentials.

If attackers obtain database credentials, they could potentially take over the entire database depending on the website's configuration.

This can result in data breaches, loss of data integrity, and compromise of the website's security.

The vulnerability has a high severity score of 8.1, indicating a high risk and likelihood of exploitation, often targeted in mass-exploit campaigns.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability allows unauthenticated attackers to include and display local files from the target website, which can be detected by monitoring for suspicious HTTP requests attempting to exploit Local File Inclusion (LFI) patterns.

Common detection methods include inspecting web server logs for requests containing file inclusion patterns such as "../" sequences or attempts to access sensitive files like /etc/passwd or configuration files.

While no specific commands are provided, typical commands to detect such activity might include using grep on web server logs, for example:

  • grep -i 'include' /var/log/apache2/access.log
  • grep -E '\.\./|etc/passwd' /var/log/apache2/access.log

Additionally, network intrusion detection systems (NIDS) or web application firewalls (WAF) with rules targeting LFI patterns can help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Since no official patch is currently available for this vulnerability, immediate mitigation involves applying the mitigation rule provided by Patchstack to block attacks exploiting this flaw.

Users are strongly advised to update the affected Gaspard theme to a patched version as soon as it becomes available.

In the meantime, seek assistance from your hosting provider or web developer to implement mitigation measures such as configuring a web application firewall (WAF) or other security controls to prevent exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to include and display local files from the target website, potentially exposing sensitive information such as database credentials.

Exposure of sensitive information could lead to a complete database takeover depending on the site's configuration, which may result in unauthorized access to personal or protected data.

Such unauthorized data exposure and potential data breaches could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive and personal data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart