Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4551: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in yotuwp Video Gallery – YouTube Playlist, Channel Gallery by YotuWP

0
Medium
VulnerabilityCVE-2024-4551cvecve-2024-4551cwe-98
Published: Sat Jun 15 2024 (06/15/2024, 08:42:17 UTC)
Source: CVE Database V5
Vendor/Project: yotuwp
Product: Video Gallery – YouTube Playlist, Channel Gallery by YotuWP

Description

CVE-2024-4551 is a Local File Inclusion (LFI) vulnerability in the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin, affecting all versions up to 1. 3. 13. Authenticated users with contributor or higher privileges can exploit this flaw via the display function to include and execute arbitrary PHP files on the server. This can lead to unauthorized code execution, bypassing access controls, and potential data exposure. The vulnerability arises from improper control of filenames used in include/require statements (CWE-98). Exploitation does not require user interaction but does require authenticated access. The CVSS score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial confidentiality and integrity impact. No known public exploits are reported yet.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:48:29 UTC

Technical Analysis

CVE-2024-4551 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin in all versions up to 1.3.13. The vulnerability exists due to improper validation and control of filenames used in PHP include or require statements within the plugin's display function. Authenticated attackers with contributor-level or higher permissions can exploit this flaw by manipulating the input to include arbitrary PHP files stored on the server. This allows execution of arbitrary PHP code, which can lead to bypassing access controls, unauthorized data access, or full code execution on the web server. The vulnerability is significant because contributor-level access is relatively common in WordPress environments, and the plugin is widely used for embedding YouTube content. The CVSS 3.1 score of 6.4 reflects that the attack can be performed remotely over the network with low complexity, requires authentication but no user interaction, and impacts confidentiality and integrity with no effect on availability. Although no public exploits are currently known, the vulnerability's nature makes it a high-risk target for attackers seeking to escalate privileges or compromise WordPress sites. The lack of available patches at the time of disclosure increases the urgency for mitigation.

Potential Impact

The exploitation of CVE-2024-4551 can have serious consequences for organizations running vulnerable versions of the YotuWP plugin. Attackers with contributor or higher privileges can execute arbitrary PHP code, potentially leading to full site compromise, data leakage, or unauthorized access to sensitive information. This can result in defacement, data theft, or use of the compromised server as a pivot point for further attacks within the network. Since WordPress is widely used globally, and contributor access is often granted to multiple users, the attack surface is significant. The ability to bypass access controls and execute code undermines the integrity and confidentiality of the affected systems. Although availability is not directly impacted, the overall security posture and trustworthiness of the affected websites are severely compromised. Organizations may face reputational damage, regulatory penalties, and operational disruptions if exploited.

Mitigation Recommendations

To mitigate CVE-2024-4551, organizations should immediately restrict contributor-level user permissions to trusted individuals only and audit existing users for unnecessary privileges. Disable or remove the vulnerable YotuWP plugin if it is not essential. Monitor web server logs for suspicious include or require activity and anomalous PHP file executions. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit file inclusion vulnerabilities, specifically targeting the plugin's display function parameters. Until an official patch is released, consider applying virtual patching techniques or custom code filters to sanitize inputs used in include/require statements. Regularly update WordPress core, plugins, and themes to the latest versions once patches become available. Conduct security reviews and penetration testing focused on file inclusion and code injection vectors. Backup website data frequently and maintain incident response plans to quickly address potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-06T14:28:12.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b90b7ef31ef0b556b33

Added to database: 2/25/2026, 9:37:20 PM

Last enriched: 2/26/2026, 12:48:29 AM

Last updated: 2/26/2026, 9:44:01 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats