Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12040: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpwax Product Carousel Slider & Grid Ultimate for WooCommerce

0
High
VulnerabilityCVE-2024-12040cvecve-2024-12040cwe-98
Published: Thu Dec 12 2024 (12/12/2024, 05:24:19 UTC)
Source: CVE Database V5
Vendor/Project: wpwax
Product: Product Carousel Slider & Grid Ultimate for WooCommerce

Description

CVE-2024-12040 is a high-severity Local File Inclusion (LFI) vulnerability in the Product Carousel Slider & Grid Ultimate for WooCommerce WordPress plugin, affecting all versions up to 1. 9. 10. Authenticated users with Contributor-level access or higher can exploit the 'theme' attribute in the wcpcsu shortcode to include and execute arbitrary files on the server. This allows attackers to run arbitrary PHP code, bypass access controls, and potentially access sensitive data. The vulnerability requires no user interaction beyond authentication and has a CVSS score of 8. 8, indicating a critical impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. Countries with significant WooCommerce usage and WordPress hosting are at higher risk, especially where contributor-level access is more commonly granted.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:41:49 UTC

Technical Analysis

CVE-2024-12040 is a Local File Inclusion vulnerability classified under CWE-98, found in the Product Carousel Slider & Grid Ultimate for WooCommerce WordPress plugin. This vulnerability exists in all versions up to and including 1.9.10 and is triggered via the 'theme' attribute of the wcpcsu shortcode. An authenticated attacker with at least Contributor-level privileges can exploit this flaw to include arbitrary files on the server. Because the plugin improperly controls the filename used in PHP include/require statements, attackers can execute arbitrary PHP code contained within these files. This can lead to full remote code execution, bypassing normal WordPress access controls. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The impact includes potential data disclosure, privilege escalation, and complete server compromise. Although no public exploits have been reported yet, the high CVSS score (8.8) reflects the severity and ease of exploitation once authenticated access is obtained. The vulnerability is particularly dangerous because WordPress sites often allow contributors to upload media files, which can be manipulated to include malicious PHP code. The lack of a patch link indicates that users must monitor vendor updates or apply custom mitigations. This vulnerability highlights the risks of insecure file inclusion in PHP applications, especially in widely used CMS plugins.

Potential Impact

The impact of CVE-2024-12040 is significant for organizations running WordPress sites with the affected WooCommerce plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the server. This can result in full system compromise, including data theft, website defacement, installation of backdoors, and lateral movement within the network. Confidentiality is severely impacted as attackers can access sensitive customer and business data. Integrity is compromised through unauthorized code execution and potential modification of website content or backend data. Availability may be affected if attackers disrupt services or deploy ransomware. Since the vulnerability requires only Contributor-level authentication, it lowers the barrier for exploitation, especially in environments with weak access controls or compromised user accounts. The widespread use of WooCommerce and WordPress globally means many e-commerce sites could be at risk, potentially affecting revenue and customer trust. The absence of known exploits in the wild currently provides a window for proactive defense, but the threat is likely to increase as details become more widely known.

Mitigation Recommendations

1. Immediately restrict Contributor-level permissions to trusted users only and review existing user roles to minimize the number of users with upload or shortcode usage capabilities. 2. Monitor and audit all file uploads, especially images and media files, to detect any attempts to upload PHP or other executable code disguised as safe file types. 3. Implement web application firewall (WAF) rules to detect and block attempts to exploit the 'theme' attribute in the wcpcsu shortcode or suspicious file inclusion patterns. 4. Isolate the WordPress environment using containerization or sandboxing to limit the impact of any successful code execution. 5. Disable or remove the vulnerable plugin if immediate patching is not available, or replace it with a secure alternative. 6. Regularly update WordPress core, plugins, and themes to the latest versions once a patch is released by the vendor. 7. Employ file integrity monitoring to detect unauthorized changes to PHP files and other critical resources. 8. Educate site administrators and contributors about the risks of uploading untrusted files and the importance of strong authentication practices. 9. Use principle of least privilege for all WordPress roles and server file permissions to reduce attack surface. 10. Stay informed through security advisories from the plugin vendor and WordPress security communities for updates and patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T17:15:51.180Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2bb7ef31ef0b5971ce

Added to database: 2/25/2026, 9:48:27 PM

Last enriched: 2/26/2026, 4:41:49 AM

Last updated: 2/26/2026, 8:07:08 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats