WordPress PrivateContent - Mail Actions Plugin <= 2.3.2 is vulnerable to a high priority Local File Inclusion

High priority Mitigate immediately
<= 2.3.2Vulnerable version(s)
No official fix availableFixed version

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 7.5

This vulnerability is highly dangerous and expected to become exploited.

7.5

Local File Inclusion

This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

We advise to mitigate or resolve the vulnerability immediately.

Automatically mitigate vulnerabilities and keep your websites safe.

Patchstack has issued a mitigation rule to block any attacks until an official fix becomes available, can be tested and be safely applied.

Get the fastest vulnerability mitigation with Patchstack!

Get started

Details

Have additional information or questions about this entry? Let us know.

Timeline

Reported byProfile ImageBonds

1 Jul, 2025

Weekly WordPress security intelligence delivered to your inbox.