CVE-2015-10133

HIGH

CVSS v3

7.2

HIGH

EPSS Score

36.5%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and i

Technical Details

CVSS v3 Vector
3.1
Published
7/19/2025
Last Modified
12/23/2025

Frequently Asked Questions

What is CVE-2015-10133?

The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and i

Is CVE-2015-10133 actively exploited?

Active exploitation of CVE-2015-10133 has not been confirmed. The EPSS score is 36.5%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2015-10133?

CVE-2015-10133 has a CVSS v3 base score of 7.2 (HIGH severity), with vector string 3.1.

Is CVE-2015-10133 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.