source: https://www.securityfocus.com/bid/49525/info Pluck is prone to multiple file-include and a file-disclosure vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit the local file-include vulnerabilities using directory-traversal strings to view and execute local files within the context of the webserver process. Information harvested may aid in further attacks. An attacker can exploit local file-disclosure vulnerability to obtain potentially sensitive information from local files on computers running the vulnerable application. This may aid in further attacks. Pluck 4.7 is vulnerable; other versions may also be affected. 1-File Inclusion: include(ALBUMS_DIR.'/'.$_GET['album'].'.php'); Require: if (file_exists(ALBUMS_DIR.'/'.$_GET['album'].'.php')) { function albums_pages_site() { 2-File Inclusion include (ALBUMS_DIR.'/'.$album['seoname'].'.php'); foreach ($albums as $album) { $albums = albums_get_albums(); 3-File Disclosure echo readfile('../../settings/modules/albums/'.$image); $image = $_GET['image']; requires: if (file_exists('../../settings/modules/albums/'.$image)) {