[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fT3bKe10reM_ppLQc1gD3zekUrcehsJ8194UgNRMcG5s":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2021-24453","include-me-local-file-inclusion-leading-to-authenticated-remote-code-execution","Include Me \u003C= 1.2.1 - Local File Inclusion leading to Authenticated Remote Code Execution","The Include Me WordPress plugin through 1.2.1 is vulnerable to path traversal \u002F local file inclusion, which can lead to Remote Code Execution (RCE) of the system due to log poisoning and therefore potentially a full compromise of the underlying structure","include-me",null,"\u003C=1.2.1","1.2.2","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Control of Filename for Include\u002FRequire Statement in PHP Program ('PHP Remote File Inclusion')","2022-01-02 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F75ac23b7-bcc0-41ce-8cfc-e1de3954d169?source=api-prod",751]