
Cloud Vulnerability DB
A community-led vulnerabilities database
The Include Me WordPress plugin through version 1.2.1 contains a critical security vulnerability identified as CVE-2021-24453. The vulnerability was discovered and publicly disclosed on June 21, 2021. This security flaw affects the Include Me WordPress plugin and allows for path traversal and local file inclusion, which can potentially lead to Remote Code Execution (RCE) (WPScan Details).
The vulnerability is classified as a path traversal/local file inclusion issue that can be escalated to Remote Code Execution through log poisoning. It has been assigned a CVSS score of 8.8 (High) and is categorized under CWE-94 and OWASP Top 10 A1: Injection. The vulnerability requires authentication at the level of an author or above, allowing attackers to exploit the shortcode functionality to access files outside the intended directory structure (WPScan Details).
When successfully exploited, this vulnerability can lead to a full compromise of the underlying system structure. An authenticated attacker can achieve Remote Code Execution, potentially gaining complete control over the affected WordPress installation and access to sensitive system files (WPScan Details).
The vulnerability has been fixed in version 1.2.2 of the Include Me WordPress plugin. Website administrators running affected versions should immediately update to version 1.2.2 or later to mitigate this security risk (WPScan Details).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."