Skip to main content

CVE-2023-5815: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in infornweb News & Blog Designer Pack – WordPress Blog Plugin — (Blog Post Grid, Blog Post Slider, Blog Post Carousel, Blog Post Ticker, Blog Post Masonry)

High
VulnerabilityCVE-2023-5815cvecve-2023-5815cwe-98
Published: Wed Nov 22 2023 (11/22/2023, 15:33:22 UTC)
Source: CVE Database V5
Vendor/Project: infornweb
Product: News & Blog Designer Pack – WordPress Blog Plugin — (Blog Post Grid, Blog Post Slider, Blog Post Carousel, Blog Post Ticker, Blog Post Masonry)

Description

The News & Blog Designer Pack – WordPress Blog Plugin — (Blog Post Grid, Blog Post Slider, Blog Post Carousel, Blog Post Ticker, Blog Post Masonry) plugin for WordPress is vulnerable to Remote Code Execution via Local File Inclusion in all versions up to, and including, 3.4.1 via the bdp_get_more_post function hooked via a nopriv AJAX. This is due to function utilizing an unsafe extract() method to extract values from the POST variable and passing that input to the include() function. This makes it possible for unauthenticated attackers to include arbitrary PHP files and achieve remote code execution. On vulnerable Docker configurations it may be possible for an attacker to create a PHP file and then subsequently include it to achieve RCE.

AI-Powered Analysis

AILast updated: 07/11/2025, 02:03:21 UTC

Technical Analysis

CVE-2023-5815 is a high-severity vulnerability affecting the News & Blog Designer Pack WordPress plugin, which includes features such as Blog Post Grid, Slider, Carousel, Ticker, and Masonry. The vulnerability arises from improper control of filenames used in PHP's include() function, classified under CWE-98. Specifically, the plugin's bdp_get_more_post function, which is hooked via a nopriv AJAX call (meaning it can be accessed without authentication), uses the PHP extract() function unsafely on POST variables. This allows an attacker to manipulate input parameters to include arbitrary PHP files. Consequently, an unauthenticated attacker can achieve remote code execution (RCE) on the server hosting the vulnerable plugin. The risk is exacerbated in certain Docker configurations where an attacker might first create a malicious PHP file on the server and then include it via this vulnerability to execute arbitrary code. The vulnerability affects all versions up to and including 3.4.1 of the plugin. The CVSS v3.1 score is 8.1, indicating high severity, with attack vector network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is critical because it allows unauthenticated remote attackers to execute arbitrary PHP code, potentially leading to full system compromise, data theft, or service disruption.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites using the News & Blog Designer Pack plugin for content presentation. Successful exploitation could lead to full server compromise, data breaches involving sensitive customer or business data, defacement of websites, or use of the compromised server as a foothold for further attacks within the corporate network. Given the unauthenticated nature of the exploit, attackers can operate without credentials, increasing the likelihood of automated scanning and exploitation attempts. Organizations in sectors such as finance, healthcare, e-commerce, and government, which often use WordPress for public-facing websites, may face reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Additionally, the mention of Docker environments suggests that modern containerized deployments are also at risk, which are increasingly common in European enterprises adopting cloud-native architectures. The lack of available patches means organizations must act quickly to mitigate exposure, as attackers could develop exploits based on the disclosed technical details.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the vulnerable News & Blog Designer Pack plugin until a patched version is released. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX POST requests targeting the bdp_get_more_post function, especially those attempting to manipulate include parameters. 3. Restrict PHP file inclusion paths by hardcoding or validating allowed include paths within the plugin code if custom fixes are possible. 4. For Dockerized environments, ensure container file system permissions prevent unauthorized file creation and consider running containers with least privilege. 5. Monitor web server and application logs for unusual POST requests or errors related to file inclusion attempts. 6. Employ runtime application self-protection (RASP) tools that can detect and block remote code execution attempts. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Once available, promptly apply official patches from the plugin vendor. 9. Conduct security audits on all WordPress plugins to identify similar unsafe coding practices, especially those involving dynamic includes or extract() usage. 10. Educate development and operations teams about the risks of using extract() on untrusted input and the importance of input validation and sanitization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2023-10-26T19:42:47.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a781

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 2:03:21 AM

Last updated: 7/31/2025, 1:28:21 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats