Remote File Inclusion Vulnerability in WordTube Plugin by WordPress
CVE-2007-2482
Currently unrated
What is CVE-2007-2482?
The directory traversal vulnerability in the WordTube plugin (versions 1.43 and earlier) for WordPress allows attackers to exploit the wpPATH parameter when register_globals is enabled. By sending a specially crafted request containing the '..' directory traversal sequence, malicious users can include and execute arbitrary local files on the server. This poses a significant security risk, enabling unauthorized access to sensitive information or even complete server control.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
EPSS Score
28% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved