Invicti identified a Code Evaluation via Local File Inclusion (PHP).
An attacker can execute arbitrary PHP code by abusing the Local File Inclusion vulnerability on the server.
Significant attacking skills are required because there is no tool or automated way to exploit this vulnerability. The attacker should first locate the local file inclusion vulnerability, then leverage it to the remote code evaluation.
You can search and find all vulnerabilities