ChurcHope Theme Local File Inclusion (LFI)Sign up to our free email alerts service for instant vulnerability notifications!
The vulnerability is caused by improper filtration of user-supplied input passed via the 'file' HTTP GET parameter to the '/lib/downloadlink.php' script, which is publicly accessible.
|Proof of Concept||
|OWASP Top 10||A1: Injection|
|Added||2014-12-07 (over 3 years ago)|
|Last Updated||2016-06-19 (almost 2 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|