<excerpt>A user/attacker with access to the web management interface can access parts of the product source code by requesting the included files directly</excerpt>.

-</p>

Make your website safer. Use external penetration testing service. First report ready in one hour!</p>

**Hidden Content: To see this hidden content your post count must be 1 or greater.**