CVE-2024-4551: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in yotuwp Video Gallery – YouTube Playlist, Channel Gallery by YotuWP
CVE-2024-4551 is a Local File Inclusion (LFI) vulnerability in the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin, affecting all versions up to 1. 3. 13. Authenticated users with contributor or higher privileges can exploit this flaw via the display function to include and execute arbitrary PHP files on the server. This can lead to unauthorized code execution, bypassing access controls, and potential data exposure. The vulnerability arises from improper control of filenames used in include/require statements (CWE-98). Exploitation does not require user interaction but does require authenticated access. The CVSS score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial confidentiality and integrity impact. No known public exploits are reported yet.
AI Analysis
Technical Summary
CVE-2024-4551 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin in all versions up to 1.3.13. The vulnerability exists due to improper validation and control of filenames used in PHP include or require statements within the plugin's display function. Authenticated attackers with contributor-level or higher permissions can exploit this flaw by manipulating the input to include arbitrary PHP files stored on the server. This allows execution of arbitrary PHP code, which can lead to bypassing access controls, unauthorized data access, or full code execution on the web server. The vulnerability is significant because contributor-level access is relatively common in WordPress environments, and the plugin is widely used for embedding YouTube content. The CVSS 3.1 score of 6.4 reflects that the attack can be performed remotely over the network with low complexity, requires authentication but no user interaction, and impacts confidentiality and integrity with no effect on availability. Although no public exploits are currently known, the vulnerability's nature makes it a high-risk target for attackers seeking to escalate privileges or compromise WordPress sites. The lack of available patches at the time of disclosure increases the urgency for mitigation.
Potential Impact
The exploitation of CVE-2024-4551 can have serious consequences for organizations running vulnerable versions of the YotuWP plugin. Attackers with contributor or higher privileges can execute arbitrary PHP code, potentially leading to full site compromise, data leakage, or unauthorized access to sensitive information. This can result in defacement, data theft, or use of the compromised server as a pivot point for further attacks within the network. Since WordPress is widely used globally, and contributor access is often granted to multiple users, the attack surface is significant. The ability to bypass access controls and execute code undermines the integrity and confidentiality of the affected systems. Although availability is not directly impacted, the overall security posture and trustworthiness of the affected websites are severely compromised. Organizations may face reputational damage, regulatory penalties, and operational disruptions if exploited.
Mitigation Recommendations
To mitigate CVE-2024-4551, organizations should immediately restrict contributor-level user permissions to trusted individuals only and audit existing users for unnecessary privileges. Disable or remove the vulnerable YotuWP plugin if it is not essential. Monitor web server logs for suspicious include or require activity and anomalous PHP file executions. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit file inclusion vulnerabilities, specifically targeting the plugin's display function parameters. Until an official patch is released, consider applying virtual patching techniques or custom code filters to sanitize inputs used in include/require statements. Regularly update WordPress core, plugins, and themes to the latest versions once patches become available. Conduct security reviews and penetration testing focused on file inclusion and code injection vectors. Backup website data frequently and maintain incident response plans to quickly address potential compromises.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-4551: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in yotuwp Video Gallery – YouTube Playlist, Channel Gallery by YotuWP
Description
CVE-2024-4551 is a Local File Inclusion (LFI) vulnerability in the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin, affecting all versions up to 1. 3. 13. Authenticated users with contributor or higher privileges can exploit this flaw via the display function to include and execute arbitrary PHP files on the server. This can lead to unauthorized code execution, bypassing access controls, and potential data exposure. The vulnerability arises from improper control of filenames used in include/require statements (CWE-98). Exploitation does not require user interaction but does require authenticated access. The CVSS score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial confidentiality and integrity impact. No known public exploits are reported yet.
AI-Powered Analysis
Technical Analysis
CVE-2024-4551 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Video Gallery – YouTube Playlist, Channel Gallery by YotuWP WordPress plugin in all versions up to 1.3.13. The vulnerability exists due to improper validation and control of filenames used in PHP include or require statements within the plugin's display function. Authenticated attackers with contributor-level or higher permissions can exploit this flaw by manipulating the input to include arbitrary PHP files stored on the server. This allows execution of arbitrary PHP code, which can lead to bypassing access controls, unauthorized data access, or full code execution on the web server. The vulnerability is significant because contributor-level access is relatively common in WordPress environments, and the plugin is widely used for embedding YouTube content. The CVSS 3.1 score of 6.4 reflects that the attack can be performed remotely over the network with low complexity, requires authentication but no user interaction, and impacts confidentiality and integrity with no effect on availability. Although no public exploits are currently known, the vulnerability's nature makes it a high-risk target for attackers seeking to escalate privileges or compromise WordPress sites. The lack of available patches at the time of disclosure increases the urgency for mitigation.
Potential Impact
The exploitation of CVE-2024-4551 can have serious consequences for organizations running vulnerable versions of the YotuWP plugin. Attackers with contributor or higher privileges can execute arbitrary PHP code, potentially leading to full site compromise, data leakage, or unauthorized access to sensitive information. This can result in defacement, data theft, or use of the compromised server as a pivot point for further attacks within the network. Since WordPress is widely used globally, and contributor access is often granted to multiple users, the attack surface is significant. The ability to bypass access controls and execute code undermines the integrity and confidentiality of the affected systems. Although availability is not directly impacted, the overall security posture and trustworthiness of the affected websites are severely compromised. Organizations may face reputational damage, regulatory penalties, and operational disruptions if exploited.
Mitigation Recommendations
To mitigate CVE-2024-4551, organizations should immediately restrict contributor-level user permissions to trusted individuals only and audit existing users for unnecessary privileges. Disable or remove the vulnerable YotuWP plugin if it is not essential. Monitor web server logs for suspicious include or require activity and anomalous PHP file executions. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit file inclusion vulnerabilities, specifically targeting the plugin's display function parameters. Until an official patch is released, consider applying virtual patching techniques or custom code filters to sanitize inputs used in include/require statements. Regularly update WordPress core, plugins, and themes to the latest versions once patches become available. Conduct security reviews and penetration testing focused on file inclusion and code injection vectors. Backup website data frequently and maintain incident response plans to quickly address potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-06T14:28:12.968Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b90b7ef31ef0b556b33
Added to database: 2/25/2026, 9:37:20 PM
Last enriched: 2/26/2026, 12:48:29 AM
Last updated: 2/26/2026, 9:44:01 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.