### [CVE-2015-8351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8351) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled. ### POC #### Reference - http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html - https://www.exploit-db.com/exploits/38861/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/G01d3nW01f/CVE-2015-8351 - https://github.com/Ki11i0n4ir3/CVE-2015-8351 - https://github.com/igruntplay/exploit-CVE-2015-8351