Impact
Improper control of filename in the SERPed.net plugin’s include/require statement permits local file inclusion. This flaw can enable an attacker to read sensitive files on the server or, if a PHP file is included, execute arbitrary code, thereby compromising confidentiality and integrity of the application.
Affected Systems
The vulnerability exists in the SERPed.net WordPress plugin, affecting all released versions through 4.6. It is relevant to installations that use any of these versions of the plugin.
Risk and Exploitability
The public CVSS score is 8.1 and the EPSS score is less than 1 %, indicating a high severity but low current exploitation probability. The flaw is not listed in CISA’s KEV catalog. The attack vector is likely via a crafted request that causes the plugin to include a controlled file path; exploitable conditions include the plugin being enabled and accessible to an unauthenticated or authenticated user depending on the plugin’s input handling.
OpenCVE Enrichment
EUVD