CVE-2024-12859: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PX-lab BoomBox Theme Extensions
CVE-2024-12859 is a high-severity Local File Inclusion (LFI) vulnerability in the BoomBox Theme Extensions plugin for WordPress, affecting all versions up to 1. 8. 0. It allows authenticated users with contributor-level or higher permissions to exploit the 'boombox_listing' shortcode 'type' attribute to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability stems from improper control of filenames used in include/require statements (CWE-98). No user interaction beyond authentication is required, and the attack can be performed remotely over the network. Although no known exploits are currently in the wild, the CVSS score of 8. 8 indicates a critical risk. Organizations using this plugin should prioritize patching or mitigation to prevent potential compromise.
AI Analysis
Technical Summary
CVE-2024-12859 is a Local File Inclusion vulnerability classified under CWE-98, affecting the BoomBox Theme Extensions plugin for WordPress. The flaw exists in the handling of the 'boombox_listing' shortcode's 'type' attribute, which does not properly validate or sanitize input used in PHP include or require statements. Authenticated attackers with contributor-level or higher permissions can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or WordPress media upload if improperly configured), they can execute arbitrary PHP code, leading to remote code execution. This vulnerability allows bypassing of access controls and can expose sensitive information or compromise the entire web server. The vulnerability affects all versions up to and including 1.8.0 of the plugin. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, required privileges at the contributor level, no user interaction, and high impact on confidentiality, integrity, and availability. No official patches are currently linked, so mitigation relies on access control tightening and disabling vulnerable features until updates are available.
Potential Impact
The impact of CVE-2024-12859 is significant for organizations using the BoomBox Theme Extensions plugin on WordPress sites. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the web server. This can result in full system compromise, data theft, defacement, or pivoting to internal networks. Confidentiality is at risk as attackers can read sensitive files, including configuration files and credentials. Integrity is compromised by the ability to modify files or inject malicious code. Availability can be affected if attackers disrupt services or deploy ransomware. Since the vulnerability requires contributor-level access, attackers must first compromise or obtain such credentials, which is feasible in many WordPress environments due to weak credential management or phishing. The widespread use of WordPress and the popularity of the BoomBox theme increase the potential attack surface globally.
Mitigation Recommendations
1. Immediately restrict contributor-level permissions and audit user roles to ensure only trusted users have contributor or higher access. 2. Disable or remove the BoomBox Theme Extensions plugin if it is not essential. 3. Monitor and restrict file upload capabilities, ensuring that executable PHP files cannot be uploaded or executed. 4. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'boombox_listing' shortcode 'type' parameter. 5. Apply strict input validation and sanitization for any shortcode attributes if custom modifications are possible. 6. Regularly monitor logs for suspicious include or require calls and unexpected file access patterns. 7. Stay alert for official patches or updates from PX-lab and apply them promptly once available. 8. Employ principle of least privilege for all WordPress users and consider multi-factor authentication to reduce risk of credential compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12859: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PX-lab BoomBox Theme Extensions
Description
CVE-2024-12859 is a high-severity Local File Inclusion (LFI) vulnerability in the BoomBox Theme Extensions plugin for WordPress, affecting all versions up to 1. 8. 0. It allows authenticated users with contributor-level or higher permissions to exploit the 'boombox_listing' shortcode 'type' attribute to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability stems from improper control of filenames used in include/require statements (CWE-98). No user interaction beyond authentication is required, and the attack can be performed remotely over the network. Although no known exploits are currently in the wild, the CVSS score of 8. 8 indicates a critical risk. Organizations using this plugin should prioritize patching or mitigation to prevent potential compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-12859 is a Local File Inclusion vulnerability classified under CWE-98, affecting the BoomBox Theme Extensions plugin for WordPress. The flaw exists in the handling of the 'boombox_listing' shortcode's 'type' attribute, which does not properly validate or sanitize input used in PHP include or require statements. Authenticated attackers with contributor-level or higher permissions can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or WordPress media upload if improperly configured), they can execute arbitrary PHP code, leading to remote code execution. This vulnerability allows bypassing of access controls and can expose sensitive information or compromise the entire web server. The vulnerability affects all versions up to and including 1.8.0 of the plugin. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, required privileges at the contributor level, no user interaction, and high impact on confidentiality, integrity, and availability. No official patches are currently linked, so mitigation relies on access control tightening and disabling vulnerable features until updates are available.
Potential Impact
The impact of CVE-2024-12859 is significant for organizations using the BoomBox Theme Extensions plugin on WordPress sites. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the web server. This can result in full system compromise, data theft, defacement, or pivoting to internal networks. Confidentiality is at risk as attackers can read sensitive files, including configuration files and credentials. Integrity is compromised by the ability to modify files or inject malicious code. Availability can be affected if attackers disrupt services or deploy ransomware. Since the vulnerability requires contributor-level access, attackers must first compromise or obtain such credentials, which is feasible in many WordPress environments due to weak credential management or phishing. The widespread use of WordPress and the popularity of the BoomBox theme increase the potential attack surface globally.
Mitigation Recommendations
1. Immediately restrict contributor-level permissions and audit user roles to ensure only trusted users have contributor or higher access. 2. Disable or remove the BoomBox Theme Extensions plugin if it is not essential. 3. Monitor and restrict file upload capabilities, ensuring that executable PHP files cannot be uploaded or executed. 4. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'boombox_listing' shortcode 'type' parameter. 5. Apply strict input validation and sanitization for any shortcode attributes if custom modifications are possible. 6. Regularly monitor logs for suspicious include or require calls and unexpected file access patterns. 7. Stay alert for official patches or updates from PX-lab and apply them promptly once available. 8. Employ principle of least privilege for all WordPress users and consider multi-factor authentication to reduce risk of credential compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-20T16:55:39.861Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e4bb7ef31ef0b59c684
Added to database: 2/25/2026, 9:48:59 PM
Last enriched: 2/26/2026, 2:41:26 AM
Last updated: 2/26/2026, 8:07:19 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.