CVE-2015-10133 (CNNVD-202507-2499)
中文标题:
WordPress plugin Subscribe to Comments 安全漏洞
英文标题:
Subscribe to Comments <= 2.1.2 - Local File Includion
漏洞描述
中文描述:
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Subscribe to Comments 2.1.2及之前版本存在安全漏洞,该漏洞源于Path to标头值导致本地文件包含,可能执行任意PHP代码。
英文描述:
The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This same function can also be used to execute arbitrary PHP code.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| markjaquith | Subscribe to Comments | - | ≤ 2.1.2 | - |
cpe:2.3:a:markjaquith:subscribe_to_comments:*:*:*:*:*:*:*:*
|
| markjaquith | subscribe_to_comments | * | - | - |
cpe:2.3:a:markjaquith:subscribe_to_comments:*:*:*:*:*:wordpress:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2015-10133 |
2025-11-11 15:18:54 | 2025-11-11 07:33:59 |
| NVD | nvd_CVE-2015-10133 |
2025-11-11 14:54:56 | 2025-11-11 07:42:41 |
| CNNVD | cnnvd_CNNVD-202507-2499 |
2025-11-11 15:12:51 | 2025-11-11 08:00:01 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202507-2499
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']