CVE-2024-54362
Published: 28 March 2025
Summary
CVE-2024-54362 is a high-severity Path Traversal: '.../...//' (CWE-35) vulnerability. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Remediating flaws in vulnerable software components like the GetShop Ecommerce plugin directly prevents exploitation of this path traversal vulnerability.
Validating file path inputs against traversal sequences like '.../...//' directly blocks unauthorized access to arbitrary files.
Enforcing approved access authorizations limits the impact of path traversal attempts by restricting logical access to system files.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vuln in public-facing WordPress plugin enables T1190 exploitation and directly facilitates arbitrary file read (T1005), stored data modification (T1565.001), and data destruction/disruption (T1485).
NVD Description
Path Traversal: '.../...//' vulnerability in boggibill GetShop ecommerce getshop-ecommerce allows Path Traversal.This issue affects GetShop ecommerce: from n/a through <= 1.3.
Deeper analysisAI
CVE-2024-54362 is a path traversal vulnerability (CWE-35) in the GetShop Ecommerce WordPress plugin by boggibill. The issue, exploitable via sequences like '.../...//', affects all versions of the plugin up to and including 1.3, with no specified lower bound.
Unauthenticated attackers can exploit this vulnerability remotely over the network, though it requires high attack complexity and no user interaction, according to its CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation grants high-impact access to confidentiality, integrity, and availability, enabling attackers to read, modify, or disrupt arbitrary files on the server.
The Patchstack advisory provides further details on this WordPress plugin vulnerability, including potential mitigation steps, at https://patchstack.com/database/Wordpress/Plugin/getshop-ecommerce/vulnerability/wordpress-getshop-ecommerce-plugin-1-3-path-traversal-vulnerability?_s_id=cve.
Details
- CWE(s)