CVE-2024-13545
Published: 24 January 2025
Summary
CVE-2024-13545 is a critical-severity Path Traversal (CWE-22) vulnerability in G5Plus Ultimate Bootstrap Elements For Elementor. Its CVSS base score is 9.8 (Critical).
Operationally, ranked in the top 16.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates the path parameter to block malicious local file inclusion attempts leading to PHP code execution.
Remediates the LFI flaw in the Bootstrap Ultimate WordPress theme by applying timely patches or updates beyond version 1.4.9.
Restricts the path parameter inputs to only authorized files and directories, preventing arbitrary PHP file inclusion.
NVD Description
The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.9 via the path parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the…
more
execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If php://filter is enabled on the server, this issue may directly lead to Remote Code Execution.
Deeper analysisAI
CVE-2024-13545 is a Local File Inclusion (LFI) vulnerability affecting the Bootstrap Ultimate theme for WordPress in all versions up to and including 1.4.9. The flaw exists via the path parameter, which allows unauthenticated attackers to include arbitrary PHP files on the server, leading to the execution of PHP code within those files. Associated with CWE-22, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for high confidentiality, integrity, and availability impacts.
Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By manipulating the path parameter, they can include and execute PHP files, enabling bypass of access controls, theft of sensitive data, or code execution—particularly if PHP file uploads are possible elsewhere on the site. If the server has php://filter enabled, exploitation may directly result in Remote Code Execution (RCE).
Advisories and technical details are available from sources including the Wordfence threat intelligence page (https://www.wordfence.com/threat-intel/vulnerabilities/id/ae07af10-e5fc-4f28-a343-f56c0e2bc324?source=cve) and the vulnerable code location in the theme's documentation (https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8). Security practitioners should consult these for specific mitigation guidance, such as updating the theme beyond version 1.4.9 if patches are available.
Details
- CWE(s)