CVE-2026-22496
Received Received - Intake
Local File Inclusion in AncoraThemes Hypnotherapy

Publication date: 2026-03-25

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Hypnotherapy hypnotherapy allows PHP Local File Inclusion.This issue affects Hypnotherapy: from n/a through <= 1.2.10.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
ancorathemes hypnotherapy to 1.2.10 (inc)
ancorathemes hypnotherapy From 1.0.0 (inc) to 1.2.10 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2026-22496 vulnerability allows unauthenticated attackers to include and display local files from the target website, potentially exposing sensitive information such as database credentials.

Exposure of sensitive information can lead to violations of data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive data against unauthorized access.

Therefore, exploitation of this vulnerability could compromise compliance with these common standards and regulations by enabling unauthorized data disclosure.


Can you explain this vulnerability to me?

CVE-2026-22496 is a Local File Inclusion (LFI) vulnerability found in the WordPress Hypnotherapy Theme versions up to and including 1.2.10. This vulnerability allows unauthenticated attackers to include and display local files from the target website by exploiting improper control of filename parameters in PHP include/require statements.

Because of this flaw, attackers can potentially access sensitive information stored on the server, such as database credentials, which could lead to further compromise of the website.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized access to sensitive files on the server. Attackers can exploit it to reveal confidential information like database credentials.

Depending on the website's configuration, exploitation could lead to a complete database takeover, resulting in data loss, data manipulation, or further compromise of the website.

Since the vulnerability is unauthenticated and highly exploitable, it poses a significant risk to affected websites regardless of their traffic or popularity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability allows unauthenticated attackers to include and display local files from the target website, which can be detected by monitoring for suspicious HTTP requests attempting to access local files via the vulnerable theme.

While no specific detection commands are provided, users can inspect web server logs for unusual requests containing file inclusion patterns or parameters that attempt to load local files.

Additionally, applying the mitigation rule issued by Patchstack can help block attacks targeting this vulnerability, which can also serve as a detection mechanism by logging blocked attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the mitigation rule provided by Patchstack to block attacks targeting this Local File Inclusion vulnerability.

Users are advised to update the affected Hypnotherapy theme to a version beyond 1.2.10 if such an update becomes available.

If updating is not possible, seek assistance from your hosting provider or web developer to implement the recommended mitigations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart