![](/rp/kFAqShRrnkQMbH6NYLBYoJ3lq9s.png)
File inclusion vulnerability - Wikipedia
A file inclusion vulnerability is a type of web vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time.
File Inclusion Vulnerabilities: What are they and how do they work?
Jun 22, 2021 · File Inclusion vulnerabilities allow an attacker to read and sometimes execute files on the victim server or, as is the case with Remote File Inclusion, to execute code hosted on the attacker’s machine.
File Inclusion (LFI/RFI) | Exploit Notes - HDKS
Jan 30, 2025 · Local File Inclusion (LFI) and Remote File Inclusion (RFI) are vulnerabilities that are often found to affect web applications that rely on a scripting run time.
File inclusion attacks | Infosec - infosec-institute
Dec 9, 2014 · A file inclusion vulnerability allows an attacker to access unauthorized or sensitive files available on the web server or to execute malicious files on the web server by making use of the 'include' functionality.
Local File Inclusion: Understanding and Preventing Attacks
Dec 13, 2021 · Local File Inclusion is an attack technique in which attackers trick a web application into either running or exposing files on a web server. LFI attacks can expose sensitive information, and in severe cases, they can lead to cross …
WSTG - v4.2 | OWASP Foundation
The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a “dynamic file inclusion” mechanisms implemented in the target application. The vulnerability occurs due to the use of user-supplied input without proper validation.
Testing for File Inclusion | OWASP Testing Guide
Local File Inclusion vulnerabilities are commonly seen as read only vulnerabilities that an attacker can use to read sensitive data from the server hosting the vulnerable application.
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CVE-2018-19410 Paessler PRTG Network Monitor Local File Inclusion Vulnerability; These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: ...
CVE-2025-0630 - NVD
Feb 4, 2025 · Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion attack (LFI), where any authenticated user has privileged access to files on the device's filesystem.
CISA tags Microsoft .NET and Apache OFBiz bugs as exploited in attacks
6 days ago · The first flaw is an OS command injection problem, and the second is a local file inclusion vulnerability. The patching deadline for those, too, was set to February 25, 2025.