Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12859: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PX-lab BoomBox Theme Extensions

0
High
VulnerabilityCVE-2024-12859cvecve-2024-12859cwe-98
Published: Mon Feb 03 2025 (02/03/2025, 19:22:49 UTC)
Source: CVE Database V5
Vendor/Project: PX-lab
Product: BoomBox Theme Extensions

Description

CVE-2024-12859 is a high-severity Local File Inclusion (LFI) vulnerability in the BoomBox Theme Extensions plugin for WordPress, affecting all versions up to 1. 8. 0. It allows authenticated users with contributor-level or higher permissions to exploit the 'boombox_listing' shortcode 'type' attribute to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability stems from improper control of filenames used in include/require statements (CWE-98). No user interaction beyond authentication is required, and the attack can be performed remotely over the network. Although no known exploits are currently in the wild, the CVSS score of 8. 8 indicates a critical risk. Organizations using this plugin should prioritize patching or mitigation to prevent potential compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:41:26 UTC

Technical Analysis

CVE-2024-12859 is a Local File Inclusion vulnerability classified under CWE-98, affecting the BoomBox Theme Extensions plugin for WordPress. The flaw exists in the handling of the 'boombox_listing' shortcode's 'type' attribute, which does not properly validate or sanitize input used in PHP include or require statements. Authenticated attackers with contributor-level or higher permissions can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or WordPress media upload if improperly configured), they can execute arbitrary PHP code, leading to remote code execution. This vulnerability allows bypassing of access controls and can expose sensitive information or compromise the entire web server. The vulnerability affects all versions up to and including 1.8.0 of the plugin. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, required privileges at the contributor level, no user interaction, and high impact on confidentiality, integrity, and availability. No official patches are currently linked, so mitigation relies on access control tightening and disabling vulnerable features until updates are available.

Potential Impact

The impact of CVE-2024-12859 is significant for organizations using the BoomBox Theme Extensions plugin on WordPress sites. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the web server. This can result in full system compromise, data theft, defacement, or pivoting to internal networks. Confidentiality is at risk as attackers can read sensitive files, including configuration files and credentials. Integrity is compromised by the ability to modify files or inject malicious code. Availability can be affected if attackers disrupt services or deploy ransomware. Since the vulnerability requires contributor-level access, attackers must first compromise or obtain such credentials, which is feasible in many WordPress environments due to weak credential management or phishing. The widespread use of WordPress and the popularity of the BoomBox theme increase the potential attack surface globally.

Mitigation Recommendations

1. Immediately restrict contributor-level permissions and audit user roles to ensure only trusted users have contributor or higher access. 2. Disable or remove the BoomBox Theme Extensions plugin if it is not essential. 3. Monitor and restrict file upload capabilities, ensuring that executable PHP files cannot be uploaded or executed. 4. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'boombox_listing' shortcode 'type' parameter. 5. Apply strict input validation and sanitization for any shortcode attributes if custom modifications are possible. 6. Regularly monitor logs for suspicious include or require calls and unexpected file access patterns. 7. Stay alert for official patches or updates from PX-lab and apply them promptly once available. 8. Employ principle of least privilege for all WordPress users and consider multi-factor authentication to reduce risk of credential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-20T16:55:39.861Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4bb7ef31ef0b59c684

Added to database: 2/25/2026, 9:48:59 PM

Last enriched: 2/26/2026, 2:41:26 AM

Last updated: 2/26/2026, 8:07:19 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats