Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4258: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in yotuwp Video Gallery – YouTube Playlist, Channel Gallery by YotuWP

0
Critical
VulnerabilityCVE-2024-4258cvecve-2024-4258cwe-98
Published: Sat Jun 15 2024 (06/15/2024, 08:42:16 UTC)
Source: CVE Database V5
Vendor/Project: yotuwp
Product: Video Gallery – YouTube Playlist, Channel Gallery by YotuWP

Description

CVE-2024-4258 is a critical Local File Inclusion (LFI) vulnerability in the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin, affecting all versions up to 1. 3. 13. It allows unauthenticated attackers to include and execute arbitrary files on the server via the 'settings' parameter. This can lead to remote code execution, bypassing access controls and exposing sensitive data. The vulnerability stems from improper control of filenames used in PHP include/require statements (CWE-98). Exploitation requires no authentication or user interaction and can severely impact confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the high CVSS score of 9. 8 indicates a critical risk. Organizations using this plugin should urgently apply patches or mitigations to prevent compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:32:41 UTC

Technical Analysis

CVE-2024-4258 is a critical security vulnerability classified as CWE-98, involving improper control of filenames in PHP include or require statements within the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin. This vulnerability exists in all versions up to and including 1.3.13. The flaw allows unauthenticated attackers to exploit the 'settings' parameter to perform Local File Inclusion (LFI), enabling them to include arbitrary files on the web server. Since PHP executes included files, attackers can run arbitrary PHP code, leading to remote code execution (RCE). This can be leveraged to bypass access controls, steal sensitive information, or fully compromise the affected server. The vulnerability does not require any authentication or user interaction, making it highly exploitable remotely over the network. The plugin’s failure to properly sanitize or validate the filename input in the include/require statements is the root cause. Although no public exploits have been reported yet, the vulnerability’s CVSS 3.1 score of 9.8 reflects its critical severity, with high impact on confidentiality, integrity, and availability. The lack of available patches at the time of disclosure increases the urgency for mitigation. This vulnerability poses a significant threat to WordPress sites using this plugin, especially those exposed to the internet without additional protections.

Potential Impact

The impact of CVE-2024-4258 is severe for organizations running the vulnerable YotuWP plugin on their WordPress sites. Successful exploitation can lead to full remote code execution, allowing attackers to execute arbitrary PHP code on the server. This can result in complete server compromise, including data theft, defacement, installation of backdoors, or pivoting to other internal systems. Confidentiality is at high risk due to potential access to sensitive files and databases. Integrity is compromised as attackers can modify files or data. Availability can be disrupted through destructive payloads or denial-of-service conditions. Since the vulnerability requires no authentication and no user interaction, attackers can automate exploitation at scale. This poses a significant risk to websites that rely on this plugin for video gallery functionality, including e-commerce, media, and corporate sites. The widespread use of WordPress globally amplifies the potential attack surface, making this a critical threat to many organizations.

Mitigation Recommendations

1. Immediately update the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP plugin to a patched version once available from the vendor. 2. Until a patch is released, disable or remove the plugin to eliminate the attack vector. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'settings' parameter or attempts to include local files. 4. Restrict file permissions on the web server to prevent unauthorized file uploads and execution. 5. Employ PHP configuration hardening, such as disabling allow_url_include and restricting include paths. 6. Monitor web server logs for unusual access patterns or attempts to exploit LFI. 7. Conduct a thorough security audit of affected systems to detect any signs of compromise. 8. Educate administrators to avoid uploading untrusted files and to validate all user inputs rigorously. 9. Use security plugins that can detect and block malicious file inclusions or code injections. 10. Maintain regular backups and have an incident response plan ready in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-26T13:03:50.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b84b7ef31ef0b556313

Added to database: 2/25/2026, 9:37:08 PM

Last enriched: 2/26/2026, 12:32:41 AM

Last updated: 2/26/2026, 11:18:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats