CVE-2024-3812: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeNectar Salient Core
CVE-2024-3812 is a high-severity Local File Inclusion (LFI) vulnerability in the Salient Core WordPress plugin affecting all versions up to 2. 0. 7. It allows authenticated users with contributor-level or higher permissions to exploit the 'nectar_icon' shortcode's 'icon_linea' attribute to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability requires authentication but no user interaction beyond that. No known exploits are currently reported in the wild. Organizations using the Salient Core plugin should prioritize patching or mitigating this flaw to prevent potential compromise. The CVSS score is 7. 5, reflecting high impact on confidentiality, integrity, and availability.
AI Analysis
Technical Summary
CVE-2024-3812 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Salient Core plugin for WordPress, specifically versions up to and including 2.0.7. The vulnerability arises from improper control of filenames used in include or require statements within the plugin's 'nectar_icon' shortcode, particularly the 'icon_linea' attribute. Authenticated attackers with contributor-level or higher permissions can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or misconfigurations), they can execute arbitrary PHP code, effectively achieving remote code execution. This flaw allows bypassing of access controls and can lead to full compromise of the affected WordPress site. Exploitation requires network access and valid credentials with contributor or higher privileges, but no additional user interaction is needed. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity due to its impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the risk is significant given WordPress's widespread use and the common presence of the Salient Core plugin in many websites. The vulnerability was publicly disclosed on May 18, 2024, and no official patch links are currently provided, emphasizing the need for immediate mitigation steps.
Potential Impact
The impact of CVE-2024-3812 is substantial for organizations using the Salient Core plugin on WordPress. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the server. This can result in full site compromise, including data theft, defacement, installation of backdoors, or pivoting to other internal systems. Confidentiality is at risk due to potential data exposure, integrity is compromised by unauthorized code execution, and availability can be affected if attackers disrupt services or deploy ransomware. Since contributor-level access is sufficient, attackers may leverage compromised or weak user credentials to exploit this vulnerability. Organizations with public-facing WordPress sites using this plugin are at risk of targeted attacks, especially those in sectors with high-value data or critical web infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation. The vulnerability's presence in all plugin versions up to 2.0.7 increases the attack surface globally.
Mitigation Recommendations
To mitigate CVE-2024-3812, organizations should first check for and apply any official patches or updates from ThemeNectar once available. In the absence of an official patch, immediate steps include restricting contributor-level permissions to trusted users only and auditing user accounts for suspicious activity. Disable or remove the Salient Core plugin if it is not essential. Implement web application firewall (WAF) rules to detect and block attempts to exploit the 'nectar_icon' shortcode parameters. Harden file upload mechanisms to prevent uploading of executable PHP files, and restrict file system permissions to limit the plugin's ability to include arbitrary files. Monitor server logs for unusual include or require calls and anomalous PHP executions. Conduct regular security assessments and vulnerability scans focused on WordPress plugins. Additionally, consider isolating WordPress instances in segmented network zones to limit lateral movement in case of compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-3812: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ThemeNectar Salient Core
Description
CVE-2024-3812 is a high-severity Local File Inclusion (LFI) vulnerability in the Salient Core WordPress plugin affecting all versions up to 2. 0. 7. It allows authenticated users with contributor-level or higher permissions to exploit the 'nectar_icon' shortcode's 'icon_linea' attribute to include and execute arbitrary files on the server. This can lead to remote code execution if PHP files can be uploaded and included, bypassing access controls and exposing sensitive data. The vulnerability requires authentication but no user interaction beyond that. No known exploits are currently reported in the wild. Organizations using the Salient Core plugin should prioritize patching or mitigating this flaw to prevent potential compromise. The CVSS score is 7. 5, reflecting high impact on confidentiality, integrity, and availability.
AI-Powered Analysis
Technical Analysis
CVE-2024-3812 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Salient Core plugin for WordPress, specifically versions up to and including 2.0.7. The vulnerability arises from improper control of filenames used in include or require statements within the plugin's 'nectar_icon' shortcode, particularly the 'icon_linea' attribute. Authenticated attackers with contributor-level or higher permissions can manipulate this attribute to include arbitrary files from the server filesystem. If an attacker can upload PHP files (e.g., via other plugin vulnerabilities or misconfigurations), they can execute arbitrary PHP code, effectively achieving remote code execution. This flaw allows bypassing of access controls and can lead to full compromise of the affected WordPress site. Exploitation requires network access and valid credentials with contributor or higher privileges, but no additional user interaction is needed. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity due to its impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the risk is significant given WordPress's widespread use and the common presence of the Salient Core plugin in many websites. The vulnerability was publicly disclosed on May 18, 2024, and no official patch links are currently provided, emphasizing the need for immediate mitigation steps.
Potential Impact
The impact of CVE-2024-3812 is substantial for organizations using the Salient Core plugin on WordPress. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the server. This can result in full site compromise, including data theft, defacement, installation of backdoors, or pivoting to other internal systems. Confidentiality is at risk due to potential data exposure, integrity is compromised by unauthorized code execution, and availability can be affected if attackers disrupt services or deploy ransomware. Since contributor-level access is sufficient, attackers may leverage compromised or weak user credentials to exploit this vulnerability. Organizations with public-facing WordPress sites using this plugin are at risk of targeted attacks, especially those in sectors with high-value data or critical web infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation. The vulnerability's presence in all plugin versions up to 2.0.7 increases the attack surface globally.
Mitigation Recommendations
To mitigate CVE-2024-3812, organizations should first check for and apply any official patches or updates from ThemeNectar once available. In the absence of an official patch, immediate steps include restricting contributor-level permissions to trusted users only and auditing user accounts for suspicious activity. Disable or remove the Salient Core plugin if it is not essential. Implement web application firewall (WAF) rules to detect and block attempts to exploit the 'nectar_icon' shortcode parameters. Harden file upload mechanisms to prevent uploading of executable PHP files, and restrict file system permissions to limit the plugin's ability to include arbitrary files. Monitor server logs for unusual include or require calls and anomalous PHP executions. Conduct regular security assessments and vulnerability scans focused on WordPress plugins. Additionally, consider isolating WordPress instances in segmented network zones to limit lateral movement in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-04-15T13:17:32.280Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c9db7ef31ef0b566d7c
Added to database: 2/25/2026, 9:41:49 PM
Last enriched: 2/26/2026, 6:26:15 AM
Last updated: 2/26/2026, 8:08:48 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.