CVE-2023-2249
wpForo Forum <= 2.1.7 - Authenticated (Subscriber+) Local File Include, Server-Side Request Forgery, and PHAR Deserialization via file_get_contents
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure use of file_get_contents without appropriate verification of the data being supplied to the function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to retrieve the contents of files like wp-config.php hosted on the system, perform a deserialization attack and possibly achieve remote code execution, and make requests to internal services.
| CWE | CWE-98 |
| Vendor | tomdever |
| Product | wpforo forum |
| Published | Jun 9, 2023 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for tomdever wpforo forum
Be the first to know when new high vulnerabilities affecting tomdever wpforo forum are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
tomdever / wpForo Forum
0 โค 2.1.7
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/800fa098-b29f-4979-b7bd-b1186a4dafcb?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wpforo/tags/2.1.7/classes/Actions.php#L444 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wpforo/tags/2.1.8/classes/Actions.php#L437
Credits
Hamed