Impact
An improper control of the filename for the include/require statement in the PHP code of the Docket Cache plugin allows an attacker to specify arbitrary files on the local system for inclusion. This flaw can lead to execution of unintended code if the included files contain malicious PHP, resulting in potential data disclosure or full compromise of the site. The vulnerability is classified as CWE‑98 and carries a CVSS score of 7.5.
Affected Systems
The vulnerability affects the Nawawi Jamili Docket Cache plugin, specifically versions up through 24.07.02. Any installation of this plugin that has not been updated to a version newer than 24.07.02 is impacted.
Risk and Exploitability
The vulnerability has a moderate to high severity (CVSS 7.5) and an EPSS score of less than 1%, indicating a low but non‑zero likelihood of exploitation. It is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is through a crafted input that causes the plugin to include a local file, such as a path traversal or a specially crafted query to a plugin endpoint.
OpenCVE Enrichment
EUVD