Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

WordPress Ultimate-Member 2.1.3 Local File Inclusion
[-] Title  : WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion
[-] Author : mehran feizi
[-] Category : Webapps
[-] Date : 2020-02-11
[-] vendor home page:

Vulnerable Page:

Vulnerable Source:
354: if(empty($_POST['pack'])) else
356: include_once include_once $this->packages_dir . DIRECTORY_SEPARATOR .
$_POST['pack'] . DIRECTORY_SEPARATOR . 'init.php';

localhost/wp-content/plugins/worprees plugin bug

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.