Home

Description

WordPress Plugin ultimate-member 2.1.3 contains a local file inclusion vulnerability that allows authenticated attackers to include arbitrary files by manipulating the pack parameter in class-admin-upgrade.php. Attackers can send POST requests with malicious pack values to include unintended PHP files from the packages directory and execute arbitrary code.

PUBLISHED Reserved 2026-02-06 | Published 2026-05-13 | Updated 2026-05-13 | Assigner VulnCheck




MEDIUM: 6.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Product status

2.1.3
affected

Credits

mehran feizi finder

References

www.exploit-db.com/exploits/48065 (ExploitDB-48065) exploit

www.vulncheck.com/...in-ultimate-member-local-file-inclusion (VulnCheck Advisory: WordPress Plugin ultimate-member 2.1.3 Local File Inclusion) third-party-advisory

cve.org (CVE-2020-37169)

nvd.nist.gov (CVE-2020-37169)

Download JSON