The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This same function can also be used to execute arbitrary PHP code.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 19 Jul 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This same function can also be used to execute arbitrary PHP code. | |
Title | Subscribe to Comments <= 2.1.2 - Local File Includion | |
Weaknesses | CWE-98 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-19T09:23:53.160Z
Updated: 2025-07-21T16:24:16.756Z
Reserved: 2025-07-18T21:15:47.569Z
Link: CVE-2015-10133

Updated: 2025-07-21T16:24:10.756Z

Status : Awaiting Analysis
Published: 2025-07-19T10:15:23.227
Modified: 2025-07-22T13:06:07.260
Link: CVE-2015-10133

No data.