Description
PHP remote file inclusion vulnerability in nucleus/plugins/NP_gallery.php in the NP_Gallery plugin 0.94 for Nucleus allows remote attackers to execute arbitrary PHP code via a URL in the DIR_NUCLEUS parameter. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by AntiSecurity · textwebappsphp
https://www.exploit-db.com/exploits/12787
References (5)
Core 5
Core References
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/1285
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/12787/
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/40022
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/40448
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/65004
Scores
EPSS
0.0197
EPSS Percentile
83.6%
Details
CWE
CWE-94
Status
published
Products (1)
john_bradshaw/np_gallery_plugin
0.94
Published
Nov 02, 2011
Tracked Since
Feb 18, 2026