CVE-2015-10133
HIGHCVSS v3
7.2
HIGH
EPSS Score
36.5%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and i
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 7/19/2025
- Last Modified
- 12/23/2025
Frequently Asked Questions
What is CVE-2015-10133?
The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and i
Is CVE-2015-10133 actively exploited?
Active exploitation of CVE-2015-10133 has not been confirmed. The EPSS score is 36.5%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2015-10133?
CVE-2015-10133 has a CVSS v3 base score of 7.2 (HIGH severity), with vector string 3.1.
Is CVE-2015-10133 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.