Local File Inclusion Vulnerability in Ultimate Member Plugin by WordPress
CVE-2020-37169
Key Information:
- Vendor
WordPress
- Status
- Vendor
- CVE Published:
- 13 May 2026
Badges
What is CVE-2020-37169?
The Ultimate Member Plugin version 2.1.3 for WordPress suffers from a local file inclusion vulnerability due to improper validation of the 'pack' parameter in class-admin-upgrade.php. Authenticated attackers can exploit this flaw by sending specially crafted POST requests that manipulate the pack parameter, allowing them to include arbitrary files from the packages directory. This exploitation can lead to the execution of unintended PHP files, potentially compromising the security of the affected WordPress site. It is crucial for users to address this vulnerability by updating to secure versions.
Affected Version(s)
ultimate-member 2.1.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved