5
CVSSv2

CVE-2015-4153

Published: 10/06/2015 Updated: 09/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in the zM Ajax Login & Register plugin prior to 1.1.0 for WordPress allows remote malicious users to include and execute arbitrary php files via a relative path in the template parameter in a load_template action to wp-admin/admin-ajax.php.

Vulnerable Product Search on Vulmon Subscribe to Product

zanematthew zm ajax login \\& register

Exploits

# Exploit Title: CVE-2015-4153 - WordPress zM Ajax Login & Register Plugin [Local File Inclusion] # Date: 2015/06/01 # Exploit Author: Panagiotis Vagenas # Contact: twittercom/panVagenas # Vendor Homepage: zanematthewcom/ # Software Link: downloadswordpressorg/plugin/zm-ajax-login-register109zip # Version: 109 # ...
WordPress zM Ajax Login and Register plugin version 109 suffers from a local file inclusion vulnerability ...