### [CVE-2024-6164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6164) ![](https://img.shields.io/static/v1?label=Product&message=Filter%20%26%20Grids&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.8.33%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) ### Description The Filter & Grids WordPress plugin before 2.8.33 is vulnerable to Local File Inclusion via the post_layout parameter. This makes it possible for an unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files. ### POC #### Reference - https://wpscan.com/vulnerability/40bd880e-67a1-4180-b197-8dcadaa0ace4/ #### Github No PoCs found on GitHub currently.