### [CVE-2021-24242](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24242) ![](https://img.shields.io/static/v1?label=Product&message=Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.8.8%3C%201.8.8%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) ### Description The Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.8 is affected by a local file inclusion vulnerability through the maliciously constructed sub_page parameter of the plugin's Tools, allowing high privilege users to include any local php file ### POC #### Reference - https://wpscan.com/vulnerability/20f3e63a-31d8-49a0-b4ef-209749feff5c #### Github No PoCs found on GitHub currently.