Cyber Posture

CVE-2024-13545

Critical

Published: 24 January 2025

Published
24 January 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0185 83.1th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13545 is a critical-severity Path Traversal (CWE-22) vulnerability in G5Plus Ultimate Bootstrap Elements For Elementor. Its CVSS base score is 9.8 (Critical).

Operationally, ranked in the top 16.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates the path parameter to block malicious local file inclusion attempts leading to PHP code execution.

prevent

Remediates the LFI flaw in the Bootstrap Ultimate WordPress theme by applying timely patches or updates beyond version 1.4.9.

prevent

Restricts the path parameter inputs to only authorized files and directories, preventing arbitrary PHP file inclusion.

NVD Description

The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.9 via the path parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the…

more

execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If php://filter is enabled on the server, this issue may directly lead to Remote Code Execution.

Deeper analysisAI

CVE-2024-13545 is a Local File Inclusion (LFI) vulnerability affecting the Bootstrap Ultimate theme for WordPress in all versions up to and including 1.4.9. The flaw exists via the path parameter, which allows unauthenticated attackers to include arbitrary PHP files on the server, leading to the execution of PHP code within those files. Associated with CWE-22, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for high confidentiality, integrity, and availability impacts.

Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By manipulating the path parameter, they can include and execute PHP files, enabling bypass of access controls, theft of sensitive data, or code execution—particularly if PHP file uploads are possible elsewhere on the site. If the server has php://filter enabled, exploitation may directly result in Remote Code Execution (RCE).

Advisories and technical details are available from sources including the Wordfence threat intelligence page (https://www.wordfence.com/threat-intel/vulnerabilities/id/ae07af10-e5fc-4f28-a343-f56c0e2bc324?source=cve) and the vulnerable code location in the theme's documentation (https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8). Security practitioners should consult these for specific mitigation guidance, such as updating the theme beyond version 1.4.9 if patches are available.

Details

CWE(s)

Affected Products

g5plus
ultimate bootstrap elements for elementor
≤ 1.4.9

CVEs Like This One

CVE-2025-2328Same product class: WordPress / CMS plugin
CVE-2025-7360Same product class: WordPress / CMS plugin
CVE-2025-1661Same product class: WordPress / CMS plugin
CVE-2025-22786Same product class: WordPress / CMS plugin
CVE-2024-10591Same product class: WordPress / CMS plugin
CVE-2025-14457Same product class: WordPress / CMS plugin
CVE-2024-13921Same product class: WordPress / CMS plugin
CVE-2025-1323Same product class: WordPress / CMS plugin
CVE-2024-13875Same product class: WordPress / CMS plugin
CVE-2024-13359Same product class: WordPress / CMS plugin

References