Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13408: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpwax Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget

0
High
VulnerabilityCVE-2024-13408cvecve-2024-13408cwe-98
Published: Fri Jan 24 2025 (01/24/2025, 11:07:33 UTC)
Source: CVE Database V5
Vendor/Project: wpwax
Product: Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget

Description

CVE-2024-13408 is a high-severity Local File Inclusion (LFI) vulnerability in the WordPress plugin 'Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget' by wpwax, affecting all versions up to 1. 6. 10. The flaw exists in the handling of the 'theme' attribute of the pgcu shortcode, allowing authenticated users with Contributor-level access or higher to include and execute arbitrary PHP files on the server. This can lead to remote code execution, bypass of access controls, and exposure of sensitive data. Exploitation requires authentication but no user interaction beyond that. The vulnerability has a CVSS 3. 1 score of 7. 5, reflecting high impact on confidentiality, integrity, and availability. No public exploits are currently known.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:11:50 UTC

Technical Analysis

CVE-2024-13408 is a Local File Inclusion vulnerability classified under CWE-98, affecting the WordPress plugin 'Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget' developed by wpwax. The vulnerability arises from improper control of the filename used in the include/require statement within the plugin's code, specifically via the 'theme' attribute in the 'pgcu' shortcode. Authenticated attackers with at least Contributor-level privileges can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other vulnerabilities or upload features), they can execute arbitrary PHP code, leading to remote code execution. This flaw enables attackers to bypass access controls, access sensitive files, and potentially take full control of the affected WordPress site and underlying server. The vulnerability affects all plugin versions up to and including 1.6.10. The CVSS 3.1 vector indicates network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability's nature and ease of exploitation by authenticated users make it a significant risk for WordPress sites using this plugin.

Potential Impact

The impact of CVE-2024-13408 is substantial for organizations running WordPress sites with the vulnerable plugin. Successful exploitation can lead to remote code execution on the web server, allowing attackers to execute arbitrary PHP code. This can result in full site compromise, including defacement, data theft, insertion of backdoors, and pivoting to internal networks. Confidential information stored on the server or accessible via the WordPress installation may be exposed. Integrity of website content and data can be compromised, and availability may be disrupted through malicious actions such as deleting files or deploying ransomware. Since the vulnerability requires only Contributor-level access, attackers who gain such access through weak credentials, social engineering, or other vulnerabilities can escalate their privileges and fully compromise the site. This poses a risk to organizations of all sizes, especially those relying on WordPress for business-critical websites, e-commerce, or customer portals.

Mitigation Recommendations

To mitigate CVE-2024-13408, organizations should immediately update the 'Post Grid, Slider & Carousel Ultimate' plugin to a patched version once available. Until a patch is released, restrict Contributor-level and higher privileges to trusted users only and audit existing user roles to minimize risk. Implement strict file upload controls and scanning to prevent attackers from uploading malicious PHP files that could be included. Employ Web Application Firewalls (WAFs) with rules targeting LFI patterns to detect and block exploitation attempts. Disable or restrict the use of the vulnerable shortcode ('pgcu') if feasible. Monitor server and WordPress logs for unusual file inclusion attempts or privilege escalations. Additionally, harden the server environment by disabling PHP execution in upload directories and applying the principle of least privilege to WordPress file permissions. Regularly back up WordPress sites and test restoration procedures to recover quickly from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T17:04:03.757Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e55b7ef31ef0b59e684

Added to database: 2/25/2026, 9:49:09 PM

Last enriched: 2/26/2026, 1:11:50 AM

Last updated: 2/26/2026, 3:36:12 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats