Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52385: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wpmart Team Member

0
Unknown
VulnerabilityCVE-2024-52385cvecve-2024-52385
Published: Mon Dec 09 2024 (12/09/2024, 13:11:58 UTC)
Source: CVE Database V5
Vendor/Project: wpmart
Product: Team Member

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpmart Team Member team-showcase-supreme.This issue affects Team Member: from n/a through <= 7.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 08:58:04 UTC

Technical Analysis

CVE-2024-52385 identifies a remote file inclusion vulnerability in the wpmart Team Member plugin (team-showcase-supreme) for PHP-based web applications, specifically affecting versions up to 7.4. The vulnerability stems from improper validation and control over filenames passed to PHP's include or require statements. This flaw allows an attacker to supply a crafted filename parameter that references a remote malicious file, which the server then includes and executes. Remote File Inclusion (RFI) vulnerabilities are particularly dangerous because they can lead to arbitrary code execution, enabling attackers to take full control of the affected system, steal data, or pivot within the network. The vulnerability does not require authentication or user interaction, increasing its exploitability. Although no public exploits have been reported yet, the nature of RFI vulnerabilities and the widespread use of PHP and WordPress plugins make this a critical risk. The lack of a CVSS score suggests the vulnerability is newly disclosed, but its characteristics align with high-impact RFI flaws. The affected product, wpmart Team Member, is a WordPress plugin used to showcase team members on websites, meaning many small to medium businesses and organizations using WordPress could be impacted. The vulnerability was reserved in November 2024 and published in December 2024, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2024-52385 is severe for organizations using the vulnerable wpmart Team Member plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the web server. This can result in full system compromise, data theft, website defacement, deployment of malware or ransomware, and use of the compromised server as a pivot point for further attacks within the network. The vulnerability affects the confidentiality, integrity, and availability of affected systems. Since no authentication or user interaction is required, attackers can exploit this remotely and at scale, increasing the risk of widespread attacks. Organizations relying on WordPress for their web presence, especially those using the wpmart Team Member plugin, face significant operational and reputational risks. Additionally, compromised web servers can be used to launch attacks against other targets, amplifying the threat beyond the initial victim. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the critical nature of the vulnerability.

Mitigation Recommendations

To mitigate CVE-2024-52385, organizations should immediately update the wpmart Team Member plugin to a patched version once available. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate exposure. Implement strict input validation and sanitization on all parameters that influence file inclusion to prevent remote file references. Employ web application firewalls (WAFs) with rules designed to detect and block attempts to exploit RFI vulnerabilities, such as blocking requests containing suspicious URL parameters or remote file URLs. Restrict PHP configurations by disabling allow_url_include and allow_url_fopen directives to prevent inclusion of remote files. Conduct thorough security audits of all plugins and custom code to identify similar vulnerabilities. Monitor web server logs for unusual requests attempting to include remote files. Finally, maintain regular backups and incident response plans to quickly recover from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-11T06:38:47.503Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7540e6bfc5ba1df03993

Added to database: 4/1/2026, 7:42:56 PM

Last enriched: 4/2/2026, 8:58:04 AM

Last updated: 4/6/2026, 11:30:51 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses