Wili-CMS remote and local File Inclusion and Authentication Bypass

Summary
Wili-CMS is prone to a remote and local file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue can allow an attacker to compromise the application and the underlying computer other attacks are also possible. Wili-CMS is also prone to a Authentication Bypass which allows a guest to login as admin.
Solution
Upgrade to a newer version if available at http://wili-cms.sourceforge.net/