Second-Order Remote File Inclusion (RFI) Vulnerability Introduction & Example This article provides an introduction to the Second-Order Remote File Inclusion (RFI) vulnerability, with an example, and explains how Netsparker can detect it.