PHP remote file inclusion vulnerability in (1) functions.php, (2) authentication_index.php, and (3) config_gedcom.php for PHPGEDVIEW 2.61 allows remote attackers to execute arbitrary PHP code by modifying the PGV_BASE_DIRECTORY parameter to reference a URL on a remote web server that contains the code.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.07132 Percentile:
0.9111
CVSS Scoring
CVSS v3.1 Score: 9.8
Severity: CRITICAL
Mapped CWE(s)
CWE-829
: Inclusion of Functionality from Untrusted Control Sphere
All CAPEC(s)
CAPEC-175: Code Inclusion
CAPEC-201: Serialized Data External Linking
CAPEC-228: DTD Injection
CAPEC-251: Local Code Inclusion
CAPEC-252: PHP Local File Inclusion
CAPEC-253: Remote Code Inclusion
CAPEC-263: Force Use of Corrupted Files
CAPEC-538: Open-Source Library Manipulation
CAPEC-549: Local Execution of Code
CAPEC-640: Inclusion of Code in Existing Process
CAPEC-660: Root/Jailbreak Detection Evasion via Hooking