CVE-2024-11952: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in webcodingplace Classic Addons – WPBakery Page Builder
CVE-2024-11952 is a high-severity path traversal vulnerability in the Classic Addons – WPBakery Page Builder WordPress plugin. It allows authenticated users with Contributor-level access or higher, granted permissions by an Administrator, to perform limited local PHP file inclusion via the 'style' parameter. This enables attackers to execute arbitrary PHP code on the server, potentially bypassing access controls and accessing sensitive data. The vulnerability specifically affects PHP files on Windows environments and impacts all plugin versions up to 3. 0. Exploitation does not require user interaction but does require authenticated access with elevated permissions. No known public exploits are reported yet. Organizations using this plugin in Windows-based hosting environments are at risk and should prioritize patching or mitigation.
AI Analysis
Technical Summary
CVE-2024-11952 is a path traversal vulnerability classified under CWE-22 found in the Classic Addons – WPBakery Page Builder plugin for WordPress. The flaw exists in all versions up to and including 3.0, where the 'style' parameter can be manipulated by authenticated users with Contributor-level access or higher, provided they have permissions granted by an Administrator. This parameter is vulnerable to limited local PHP file inclusion, allowing attackers to include and execute arbitrary PHP files on the server. The vulnerability is constrained to Windows environments due to the way file paths and extensions are handled. By exploiting this, attackers can bypass normal access controls, execute arbitrary PHP code, and potentially gain full control over the affected server. The vulnerability leverages the ability to upload files that are normally considered safe, such as images, but which can contain embedded PHP code. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, high impact on confidentiality, integrity, and availability, and requiring low privileges but no user interaction. No public exploits have been reported yet, but the risk is significant given the widespread use of WPBakery Page Builder and the common presence of Contributor-level users in WordPress sites.
Potential Impact
This vulnerability poses a significant risk to organizations running WordPress sites with the Classic Addons – WPBakery Page Builder plugin on Windows servers. Successful exploitation can lead to arbitrary code execution, allowing attackers to take full control of the web server, access sensitive data, modify site content, or pivot to other internal systems. The ability to bypass access controls means that even users with limited privileges can escalate their capabilities, increasing insider threat risks. This can result in data breaches, defacement, malware implantation, or use of the compromised server for further attacks. The impact extends to the availability of services if attackers disrupt or disable the website. Given the popularity of WPBakery Page Builder, many websites globally could be affected, especially those hosted on Windows-based infrastructure, which is less common but still significant in certain sectors.
Mitigation Recommendations
Organizations should immediately review user permissions and restrict Contributor-level and higher access to trusted users only. Administrators should audit the Classic Addons – WPBakery Page Builder plugin usage and disable or remove it if not essential. Since no official patch links are currently available, consider applying virtual patching via web application firewalls (WAFs) to block suspicious requests targeting the 'style' parameter or attempts at path traversal patterns. Monitor logs for unusual file inclusion attempts or unexpected PHP executions. For sites on Windows servers, consider migrating to Linux-based hosting if feasible, as the vulnerability is limited to Windows environments. Regularly update the plugin once a vendor patch is released. Implement strict file upload validation and sanitization policies to prevent uploading files with embedded PHP code disguised as images or other safe types. Conduct thorough security audits and penetration testing focusing on plugin vulnerabilities and privilege escalation paths.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-11952: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in webcodingplace Classic Addons – WPBakery Page Builder
Description
CVE-2024-11952 is a high-severity path traversal vulnerability in the Classic Addons – WPBakery Page Builder WordPress plugin. It allows authenticated users with Contributor-level access or higher, granted permissions by an Administrator, to perform limited local PHP file inclusion via the 'style' parameter. This enables attackers to execute arbitrary PHP code on the server, potentially bypassing access controls and accessing sensitive data. The vulnerability specifically affects PHP files on Windows environments and impacts all plugin versions up to 3. 0. Exploitation does not require user interaction but does require authenticated access with elevated permissions. No known public exploits are reported yet. Organizations using this plugin in Windows-based hosting environments are at risk and should prioritize patching or mitigation.
AI-Powered Analysis
Technical Analysis
CVE-2024-11952 is a path traversal vulnerability classified under CWE-22 found in the Classic Addons – WPBakery Page Builder plugin for WordPress. The flaw exists in all versions up to and including 3.0, where the 'style' parameter can be manipulated by authenticated users with Contributor-level access or higher, provided they have permissions granted by an Administrator. This parameter is vulnerable to limited local PHP file inclusion, allowing attackers to include and execute arbitrary PHP files on the server. The vulnerability is constrained to Windows environments due to the way file paths and extensions are handled. By exploiting this, attackers can bypass normal access controls, execute arbitrary PHP code, and potentially gain full control over the affected server. The vulnerability leverages the ability to upload files that are normally considered safe, such as images, but which can contain embedded PHP code. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, high impact on confidentiality, integrity, and availability, and requiring low privileges but no user interaction. No public exploits have been reported yet, but the risk is significant given the widespread use of WPBakery Page Builder and the common presence of Contributor-level users in WordPress sites.
Potential Impact
This vulnerability poses a significant risk to organizations running WordPress sites with the Classic Addons – WPBakery Page Builder plugin on Windows servers. Successful exploitation can lead to arbitrary code execution, allowing attackers to take full control of the web server, access sensitive data, modify site content, or pivot to other internal systems. The ability to bypass access controls means that even users with limited privileges can escalate their capabilities, increasing insider threat risks. This can result in data breaches, defacement, malware implantation, or use of the compromised server for further attacks. The impact extends to the availability of services if attackers disrupt or disable the website. Given the popularity of WPBakery Page Builder, many websites globally could be affected, especially those hosted on Windows-based infrastructure, which is less common but still significant in certain sectors.
Mitigation Recommendations
Organizations should immediately review user permissions and restrict Contributor-level and higher access to trusted users only. Administrators should audit the Classic Addons – WPBakery Page Builder plugin usage and disable or remove it if not essential. Since no official patch links are currently available, consider applying virtual patching via web application firewalls (WAFs) to block suspicious requests targeting the 'style' parameter or attempts at path traversal patterns. Monitor logs for unusual file inclusion attempts or unexpected PHP executions. For sites on Windows servers, consider migrating to Linux-based hosting if feasible, as the vulnerability is limited to Windows environments. Regularly update the plugin once a vendor patch is released. Implement strict file upload validation and sanitization policies to prevent uploading files with embedded PHP code disguised as images or other safe types. Conduct thorough security audits and penetration testing focusing on plugin vulnerabilities and privilege escalation paths.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-11-28T00:01:18.610Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e29b7ef31ef0b596ff2
Added to database: 2/25/2026, 9:48:25 PM
Last enriched: 2/26/2026, 4:56:29 AM
Last updated: 2/26/2026, 6:15:35 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.