Description
The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This same function can also be used to execute arbitrary PHP code.
INFO
Published Date :
2025-07-19T09:23:53.160Z
Last Modified :
2026-04-08T17:34:08.012Z
Source :
Wordfence
AFFECTED PRODUCTS
The following products are affected by CVE-2015-10133 vulnerability.
| Vendors | Products |
|---|---|
| Markjaquith |
|
| Wordpress |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2015-10133.