ChurcHope Theme <= 2.1 - Local File Inclusion (LFI)Sign up to our free email alerts service for instant vulnerability notifications!
The vulnerability is caused by improper filtration of user-supplied input passed via the 'file' HTTP GET parameter to the '/lib/downloadlink.php' script, which is publicly accessible.
|Proof of Concept||
fixed in version 2.2
|OWASP Top 10||A1: Injection|
|Added||2014-12-07 (over 3 years ago)|
|Last Updated||2018-08-05 (14 days ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|