Cyber Posture

CVE-2024-13409

High

Published: 24 January 2025

Published
24 January 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0036 58.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13409 is a high-severity Path Traversal (CWE-22) vulnerability in Wpwax Post Grid\, Slider \& Carousel Ultimate. Its CVSS base score is 7.5 (High).

Operationally, ranked in the top 41.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly mitigates the LFI vulnerability by requiring validation of the untrusted 'theme' parameter to block path traversal and arbitrary file inclusion.

prevent

SI-2 ensures timely identification, reporting, and patching of the plugin flaw up to version 1.6.10, preventing exploitation as recommended in advisories.

detect

RA-5 vulnerability scanning detects the presence of the vulnerable WordPress plugin version, enabling remediation before authenticated attackers can exploit it.

NVD Description

The Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.6.10 via the 'theme' parameter of the post_type_ajax_handler() function.…

more

This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

Deeper analysisAI

CVE-2024-13409 is a Local File Inclusion (LFI) vulnerability (CWE-22) in the Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget plugin for WordPress. It affects all versions up to and including 1.6.10 and stems from inadequate validation of the 'theme' parameter in the post_type_ajax_handler() function within the plugin's AJAX handler file (includes/classes/ajax.php). The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).

Authenticated attackers with Contributor-level access or higher can exploit this vulnerability via network-accessible AJAX requests. By manipulating the 'theme' parameter, they can include arbitrary files on the server and execute PHP code within them. This enables bypassing access controls, extracting sensitive data, or achieving remote code execution, particularly if the site allows uploads of "safe" file types like images that contain embedded PHP payloads.

Advisories recommend updating to version 1.7 or later, where the issue is addressed as shown in WordPress plugin trac changeset 3227281 for the AJAX handler. Further details are available in the Wordfence threat intelligence report and the plugin's source code repositories, including the vulnerable code in tag 1.6.10.

Details

CWE(s)

Affected Products

wpwax
post grid\, slider \& carousel ultimate
≤ 1.7

CVEs Like This One

CVE-2025-24782Same product: Wpwax Post Grid\, Slider \& Carousel Ultimate
CVE-2025-1570Same vendor: Wpwax
CVE-2026-23536Shared CWE-22
CVE-2025-23422Shared CWE-22
CVE-2024-48885Shared CWE-22
CVE-2024-12849Shared CWE-22
CVE-2026-33656Shared CWE-22
CVE-2025-8343Shared CWE-22
CVE-2025-59384Shared CWE-22
CVE-2026-3051Shared CWE-22

References