{"id":246403,"date":"2025-03-03T20:21:56","date_gmt":"2025-03-03T19:21:56","guid":{"rendered":"https:\/\/glosarix.com\/glossary\/lfi-local-file-inclusion-en\/"},"modified":"2025-03-03T20:21:56","modified_gmt":"2025-03-03T19:21:56","slug":"lfi-local-file-inclusion-en","status":"publish","type":"glossary","link":"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/","title":{"rendered":"LFI (Local File Inclusion)"},"content":{"rendered":"<p>Description: Local File Inclusion (LFI) is a security vulnerability that allows an attacker to include files on a server through a web browser. This technique relies on manipulating a system&#8217;s inputs, where the attacker can modify the file paths that the server attempts to load. If the system does not properly validate these inputs, the attacker can access sensitive server files, such as configuration files, passwords, or even execute malicious code. LFI is particularly dangerous because it can lead to remote code execution (RCE) if combined with other vulnerabilities. Exploiting LFI can be used to obtain confidential information, escalate privileges, or completely compromise a server. Detecting this vulnerability is crucial in penetration testing, as it allows security professionals to identify and mitigate risks in web applications that do not properly handle file inclusion. LFI commonly occurs in applications that use input parameters to load files, such as web applications that allow user file uploads without adequate validation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: Local File Inclusion (LFI) is a security vulnerability that allows an attacker to include files on a server through a web browser. This technique relies on manipulating a system&#8217;s inputs, where the attacker can modify the file paths that the server attempts to load. If the system does not properly validate these inputs, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"glossary-categories":[11917],"glossary-tags":[12873],"glossary-languages":[],"class_list":["post-246403","glossary","type-glossary","status-publish","hentry","glossary-categories-penetration-testing-en","glossary-tags-penetration-testing-en"],"post_title":"LFI (Local File Inclusion) ","post_content":"Description: Local File Inclusion (LFI) is a security vulnerability that allows an attacker to include files on a server through a web browser. This technique relies on manipulating a system's inputs, where the attacker can modify the file paths that the server attempts to load. If the system does not properly validate these inputs, the attacker can access sensitive server files, such as configuration files, passwords, or even execute malicious code. LFI is particularly dangerous because it can lead to remote code execution (RCE) if combined with other vulnerabilities. Exploiting LFI can be used to obtain confidential information, escalate privileges, or completely compromise a server. Detecting this vulnerability is crucial in penetration testing, as it allows security professionals to identify and mitigate risks in web applications that do not properly handle file inclusion. LFI commonly occurs in applications that use input parameters to load files, such as web applications that allow user file uploads without adequate validation.","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LFI (Local File Inclusion) - Glosarix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LFI (Local File Inclusion) - Glosarix\" \/>\n<meta property=\"og:description\" content=\"Description: Local File Inclusion (LFI) is a security vulnerability that allows an attacker to include files on a server through a web browser. This technique relies on manipulating a system&#8217;s inputs, where the attacker can modify the file paths that the server attempts to load. If the system does not properly validate these inputs, the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/\" \/>\n<meta property=\"og:site_name\" content=\"Glosarix\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GlosarixOficial\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/\",\"url\":\"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/\",\"name\":\"LFI (Local File Inclusion) - Glosarix\",\"isPartOf\":{\"@id\":\"https:\/\/glosarix.com\/en\/#website\"},\"datePublished\":\"2025-03-03T19:21:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/glosarix.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LFI (Local File Inclusion)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/glosarix.com\/en\/#website\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"name\":\"Glosarix\",\"description\":\"T\u00e9rminos tecnol\u00f3gicos - Glosarix\",\"publisher\":{\"@id\":\"https:\/\/glosarix.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/glosarix.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/glosarix.com\/en\/#organization\",\"name\":\"Glosarix\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"contentUrl\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"width\":192,\"height\":192,\"caption\":\"Glosarix\"},\"image\":{\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/GlosarixOficial\",\"https:\/\/www.instagram.com\/glosarixoficial\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LFI (Local File Inclusion) - Glosarix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/","og_locale":"en_US","og_type":"article","og_title":"LFI (Local File Inclusion) - Glosarix","og_description":"Description: Local File Inclusion (LFI) is a security vulnerability that allows an attacker to include files on a server through a web browser. This technique relies on manipulating a system&#8217;s inputs, where the attacker can modify the file paths that the server attempts to load. If the system does not properly validate these inputs, the [&hellip;]","og_url":"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/","og_site_name":"Glosarix","twitter_card":"summary_large_image","twitter_site":"@GlosarixOficial","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/","url":"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/","name":"LFI (Local File Inclusion) - Glosarix","isPartOf":{"@id":"https:\/\/glosarix.com\/en\/#website"},"datePublished":"2025-03-03T19:21:56+00:00","breadcrumb":{"@id":"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/glosarix.com\/en\/glossary\/lfi-local-file-inclusion-en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/glosarix.com\/en\/"},{"@type":"ListItem","position":2,"name":"LFI (Local File Inclusion)"}]},{"@type":"WebSite","@id":"https:\/\/glosarix.com\/en\/#website","url":"https:\/\/glosarix.com\/en\/","name":"Glosarix","description":"T\u00e9rminos tecnol\u00f3gicos - Glosarix","publisher":{"@id":"https:\/\/glosarix.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/glosarix.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/glosarix.com\/en\/#organization","name":"Glosarix","url":"https:\/\/glosarix.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","contentUrl":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","width":192,"height":192,"caption":"Glosarix"},"image":{"@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/GlosarixOficial","https:\/\/www.instagram.com\/glosarixoficial\/"]}]}},"_links":{"self":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/246403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/comments?post=246403"}],"version-history":[{"count":0,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/246403\/revisions"}],"wp:attachment":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/media?parent=246403"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-categories?post=246403"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-tags?post=246403"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-languages?post=246403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}