CVE-2024-13408: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpwax Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget
CVE-2024-13408 is a high-severity Local File Inclusion (LFI) vulnerability in the WordPress plugin 'Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget' by wpwax, affecting all versions up to 1. 6. 10. The flaw exists in the handling of the 'theme' attribute of the pgcu shortcode, allowing authenticated users with Contributor-level access or higher to include and execute arbitrary PHP files on the server. This can lead to remote code execution, bypass of access controls, and exposure of sensitive data. Exploitation requires authentication but no user interaction beyond that. The vulnerability has a CVSS 3. 1 score of 7. 5, reflecting high impact on confidentiality, integrity, and availability. No public exploits are currently known.
AI Analysis
Technical Summary
CVE-2024-13408 is a Local File Inclusion vulnerability classified under CWE-98, affecting the WordPress plugin 'Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget' developed by wpwax. The vulnerability arises from improper control of the filename used in the include/require statement within the plugin's code, specifically via the 'theme' attribute in the 'pgcu' shortcode. Authenticated attackers with at least Contributor-level privileges can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other vulnerabilities or upload features), they can execute arbitrary PHP code, leading to remote code execution. This flaw enables attackers to bypass access controls, access sensitive files, and potentially take full control of the affected WordPress site and underlying server. The vulnerability affects all plugin versions up to and including 1.6.10. The CVSS 3.1 vector indicates network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability's nature and ease of exploitation by authenticated users make it a significant risk for WordPress sites using this plugin.
Potential Impact
The impact of CVE-2024-13408 is substantial for organizations running WordPress sites with the vulnerable plugin. Successful exploitation can lead to remote code execution on the web server, allowing attackers to execute arbitrary PHP code. This can result in full site compromise, including defacement, data theft, insertion of backdoors, and pivoting to internal networks. Confidential information stored on the server or accessible via the WordPress installation may be exposed. Integrity of website content and data can be compromised, and availability may be disrupted through malicious actions such as deleting files or deploying ransomware. Since the vulnerability requires only Contributor-level access, attackers who gain such access through weak credentials, social engineering, or other vulnerabilities can escalate their privileges and fully compromise the site. This poses a risk to organizations of all sizes, especially those relying on WordPress for business-critical websites, e-commerce, or customer portals.
Mitigation Recommendations
To mitigate CVE-2024-13408, organizations should immediately update the 'Post Grid, Slider & Carousel Ultimate' plugin to a patched version once available. Until a patch is released, restrict Contributor-level and higher privileges to trusted users only and audit existing user roles to minimize risk. Implement strict file upload controls and scanning to prevent attackers from uploading malicious PHP files that could be included. Employ Web Application Firewalls (WAFs) with rules targeting LFI patterns to detect and block exploitation attempts. Disable or restrict the use of the vulnerable shortcode ('pgcu') if feasible. Monitor server and WordPress logs for unusual file inclusion attempts or privilege escalations. Additionally, harden the server environment by disabling PHP execution in upload directories and applying the principle of least privilege to WordPress file permissions. Regularly back up WordPress sites and test restoration procedures to recover quickly from potential compromises.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-13408: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpwax Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget
Description
CVE-2024-13408 is a high-severity Local File Inclusion (LFI) vulnerability in the WordPress plugin 'Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget' by wpwax, affecting all versions up to 1. 6. 10. The flaw exists in the handling of the 'theme' attribute of the pgcu shortcode, allowing authenticated users with Contributor-level access or higher to include and execute arbitrary PHP files on the server. This can lead to remote code execution, bypass of access controls, and exposure of sensitive data. Exploitation requires authentication but no user interaction beyond that. The vulnerability has a CVSS 3. 1 score of 7. 5, reflecting high impact on confidentiality, integrity, and availability. No public exploits are currently known.
AI-Powered Analysis
Technical Analysis
CVE-2024-13408 is a Local File Inclusion vulnerability classified under CWE-98, affecting the WordPress plugin 'Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget' developed by wpwax. The vulnerability arises from improper control of the filename used in the include/require statement within the plugin's code, specifically via the 'theme' attribute in the 'pgcu' shortcode. Authenticated attackers with at least Contributor-level privileges can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other vulnerabilities or upload features), they can execute arbitrary PHP code, leading to remote code execution. This flaw enables attackers to bypass access controls, access sensitive files, and potentially take full control of the affected WordPress site and underlying server. The vulnerability affects all plugin versions up to and including 1.6.10. The CVSS 3.1 vector indicates network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability's nature and ease of exploitation by authenticated users make it a significant risk for WordPress sites using this plugin.
Potential Impact
The impact of CVE-2024-13408 is substantial for organizations running WordPress sites with the vulnerable plugin. Successful exploitation can lead to remote code execution on the web server, allowing attackers to execute arbitrary PHP code. This can result in full site compromise, including defacement, data theft, insertion of backdoors, and pivoting to internal networks. Confidential information stored on the server or accessible via the WordPress installation may be exposed. Integrity of website content and data can be compromised, and availability may be disrupted through malicious actions such as deleting files or deploying ransomware. Since the vulnerability requires only Contributor-level access, attackers who gain such access through weak credentials, social engineering, or other vulnerabilities can escalate their privileges and fully compromise the site. This poses a risk to organizations of all sizes, especially those relying on WordPress for business-critical websites, e-commerce, or customer portals.
Mitigation Recommendations
To mitigate CVE-2024-13408, organizations should immediately update the 'Post Grid, Slider & Carousel Ultimate' plugin to a patched version once available. Until a patch is released, restrict Contributor-level and higher privileges to trusted users only and audit existing user roles to minimize risk. Implement strict file upload controls and scanning to prevent attackers from uploading malicious PHP files that could be included. Employ Web Application Firewalls (WAFs) with rules targeting LFI patterns to detect and block exploitation attempts. Disable or restrict the use of the vulnerable shortcode ('pgcu') if feasible. Monitor server and WordPress logs for unusual file inclusion attempts or privilege escalations. Additionally, harden the server environment by disabling PHP execution in upload directories and applying the principle of least privilege to WordPress file permissions. Regularly back up WordPress sites and test restoration procedures to recover quickly from potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-15T17:04:03.757Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e55b7ef31ef0b59e684
Added to database: 2/25/2026, 9:49:09 PM
Last enriched: 2/26/2026, 1:11:50 AM
Last updated: 2/26/2026, 3:36:12 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumCVE-2026-2498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bulktheme WP Social Meta
MediumCVE-2026-2489: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in readymadeweb TP2WP Importer
MediumCVE-2026-2029: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livemesh Livemesh Addons for Beaver Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.