CVE-2026-22494
Received Received - Intake
Local File Inclusion in ThemeREX Good Homes

Publication date: 2026-03-25

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Good Homes good-homes allows PHP Local File Inclusion.This issue affects Good Homes: from n/a through <= 1.3.13.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
themerex good_homes to 1.3.13 (inc)
themerex good_homes From 1.0.0 (inc) to 1.3.13 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Local File Inclusion (LFI) vulnerability in the Good Homes WordPress theme allows attackers to access and display local files, potentially exposing sensitive information such as database credentials.

Exposure of sensitive data due to this vulnerability could lead to violations of data protection regulations like GDPR and HIPAA, which require the protection of personal and sensitive information.

If exploited, this vulnerability could result in unauthorized access to confidential data, thereby compromising compliance with these standards that mandate strict controls over data confidentiality and integrity.


Can you explain this vulnerability to me?

CVE-2026-22494 is a Local File Inclusion (LFI) vulnerability found in the WordPress Good Homes Theme versions up to and including 1.3.13.

This vulnerability allows unauthenticated attackers to include and display local files from the target website by exploiting improper control of filename parameters in PHP include/require statements.

As a result, attackers can potentially access sensitive information stored on the server, such as database credentials.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to serious security risks including exposure of sensitive files and data.

Attackers may gain access to critical information like database credentials, which could result in a complete database takeover depending on the website's configuration.

Because the vulnerability requires no privileges to exploit, it poses a high risk and can be targeted in mass-exploit campaigns against many websites.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability allows unauthenticated attackers to include and display local files from the target website, which can be detected by monitoring for suspicious HTTP requests attempting to exploit Local File Inclusion (LFI) patterns.

Common detection methods include inspecting web server logs for requests containing suspicious parameters that try to include local files, such as those with directory traversal sequences (e.g., ../) or attempts to include sensitive files like /etc/passwd.

  • Use command-line tools like grep to search web server access logs for suspicious patterns, for example: grep -i 'include' /var/log/apache2/access.log
  • Search for directory traversal attempts: grep -E '\.\./|%2e%2e%2f' /var/log/apache2/access.log
  • Use web application firewalls (WAF) or intrusion detection systems (IDS) with rules to detect LFI attack patterns.

What immediate steps should I take to mitigate this vulnerability?

Since no official patch is currently available for this vulnerability, immediate mitigation involves applying available rules or filters to block exploitation attempts.

Patchstack has issued a mitigation rule that can block attacks exploiting this vulnerability until an official patch is released and tested.

  • Apply the Patchstack mitigation rule to your web application firewall or security system.
  • Contact your hosting provider or web developer to assist in applying these mitigations.
  • Monitor your system for suspicious activity and unauthorized file inclusions.
  • Update the affected Good Homes theme immediately once an official patch becomes available.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart