Cyber Posture

CVE-2024-13725

Critical

Published: 18 February 2025

Published
18 February 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0040 60.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13725 is a critical-severity Path Traversal (CWE-22) vulnerability in Keap Keap Official Opt In Forms. Its CVSS base score is 9.8 (Critical).

Operationally, ranked in the top 39.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates the 'service' parameter to prevent path traversal and local file inclusion exploitation.

prevent

Requires timely remediation through patching the vulnerable Keap Opt-in Forms plugin to eliminate the LFI flaw.

prevent

Enforces file access restrictions to limit unauthorized inclusion and execution of arbitrary PHP files on the server.

NVD Description

The Keap Official Opt-in Forms plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.1 via the service parameter. This makes it possible for unauthenticated attackers to include PHP files on the server,…

more

allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If register_argc_argv is enabled on the server and pearcmd.php is installed, this issue might lead to Remote Code Execution.

Deeper analysisAI

CVE-2024-13725 is a Local File Inclusion (LFI) vulnerability, classified under CWE-22, affecting the Keap Official Opt-in Forms plugin for WordPress in all versions up to and including 2.0.1. The flaw resides in the handling of the "service" parameter within the plugin's infusionsoft.php file, enabling attackers to include arbitrary PHP files from the server. This vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and lack of prerequisites.

Unauthenticated attackers can exploit this vulnerability remotely by manipulating the service parameter to include and execute PHP files on the server. Potential impacts include bypassing access controls, extracting sensitive data, and achieving arbitrary code execution, particularly if PHP file uploads are possible elsewhere on the site. In specific server configurations where register_argc_argv is enabled and pearcmd.php is present, exploitation could escalate to full Remote Code Execution (RCE).

Mitigation is addressed through a patch in WordPress plugin changeset 3243545, available via updates on the official plugin page at wordpress.org/plugins/infusionsoft-official-opt-in-forms. Security advisories, such as Wordfence's threat intelligence report, detail the issue and recommend immediate updates, while the plugin's source code at line 2540 in infusionsoft.php illustrates the vulnerable code path.

Details

CWE(s)

Affected Products

keap
keap official opt in forms
≤ 2.0.1

CVEs Like This One

CVE-2026-23536Shared CWE-22
CVE-2025-23422Shared CWE-22
CVE-2024-48885Shared CWE-22
CVE-2024-12849Shared CWE-22
CVE-2026-33656Shared CWE-22
CVE-2025-8343Shared CWE-22
CVE-2025-59384Shared CWE-22
CVE-2026-3051Shared CWE-22
CVE-2025-15031Shared CWE-22
CVE-2025-12062Shared CWE-22

References