CVE-2024-13409
Published: 24 January 2025
Summary
CVE-2024-13409 is a high-severity Path Traversal (CWE-22) vulnerability in Wpwax Post Grid\, Slider \& Carousel Ultimate. Its CVSS base score is 7.5 (High).
Operationally, ranked in the top 41.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly mitigates the LFI vulnerability by requiring validation of the untrusted 'theme' parameter to block path traversal and arbitrary file inclusion.
SI-2 ensures timely identification, reporting, and patching of the plugin flaw up to version 1.6.10, preventing exploitation as recommended in advisories.
RA-5 vulnerability scanning detects the presence of the vulnerable WordPress plugin version, enabling remediation before authenticated attackers can exploit it.
NVD Description
The Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.6.10 via the 'theme' parameter of the post_type_ajax_handler() function.…
more
This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Deeper analysisAI
CVE-2024-13409 is a Local File Inclusion (LFI) vulnerability (CWE-22) in the Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget plugin for WordPress. It affects all versions up to and including 1.6.10 and stems from inadequate validation of the 'theme' parameter in the post_type_ajax_handler() function within the plugin's AJAX handler file (includes/classes/ajax.php). The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
Authenticated attackers with Contributor-level access or higher can exploit this vulnerability via network-accessible AJAX requests. By manipulating the 'theme' parameter, they can include arbitrary files on the server and execute PHP code within them. This enables bypassing access controls, extracting sensitive data, or achieving remote code execution, particularly if the site allows uploads of "safe" file types like images that contain embedded PHP payloads.
Advisories recommend updating to version 1.7 or later, where the issue is addressed as shown in WordPress plugin trac changeset 3227281 for the AJAX handler. Further details are available in the Wordfence threat intelligence report and the plugin's source code repositories, including the vulnerable code in tag 1.6.10.
Details
- CWE(s)