Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53739: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Cool Plugins Cryptocurrency Widgets For Elementor

0
Unknown
VulnerabilityCVE-2024-53739cvecve-2024-53739
Published: Sat Nov 30 2024 (11/30/2024, 20:55:57 UTC)
Source: CVE Database V5
Vendor/Project: Cool Plugins
Product: Cryptocurrency Widgets For Elementor

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Cool Plugins Cryptocurrency Widgets For Elementor cryptocurrency-widgets-for-elementor allows PHP Local File Inclusion.This issue affects Cryptocurrency Widgets For Elementor: from n/a through <= 1.6.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:43:45 UTC

Technical Analysis

CVE-2024-53739 is a Local File Inclusion (LFI) vulnerability found in the Cool Plugins Cryptocurrency Widgets For Elementor WordPress plugin, specifically in versions up to 1.6.4. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, which allows an attacker to manipulate the input to include arbitrary files from the server's filesystem. This can lead to unauthorized disclosure of sensitive files such as configuration files, password stores, or other critical data. In some cases, LFI can be leveraged to execute arbitrary code if combined with other vulnerabilities or specific server configurations. The plugin is designed to display cryptocurrency widgets on Elementor-based WordPress sites, which are widely used by cryptocurrency-related businesses and enthusiasts. Although no public exploits have been reported yet, the vulnerability is significant due to the common use of the plugin and the sensitive nature of cryptocurrency-related websites. The lack of a CVSS score indicates that the vulnerability is newly disclosed, and no formal severity rating has been assigned. The vulnerability does not require authentication or user interaction, increasing its risk profile. The root cause is insufficient validation and sanitization of user-controlled input used in file inclusion functions, a common PHP security issue. The vulnerability was published on November 30, 2024, with no patch links currently available, indicating that users should be vigilant for updates or consider temporary mitigations.

Potential Impact

The impact of CVE-2024-53739 is potentially severe for organizations using the affected plugin on their WordPress sites. Successful exploitation can lead to unauthorized disclosure of sensitive server files, including credentials, configuration files, or other private data, compromising confidentiality. This can facilitate further attacks such as privilege escalation, remote code execution, or website defacement, impacting integrity and availability. Cryptocurrency-related websites are particularly sensitive targets due to the financial nature of their operations and the value of the data they handle. The vulnerability could be exploited remotely without authentication, increasing the attack surface and risk. Organizations may face reputational damage, financial loss, and regulatory consequences if sensitive customer or operational data is exposed. The widespread use of WordPress and the popularity of Elementor and cryptocurrency widgets increase the potential scope of affected systems globally. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a likely target for attackers once exploit code becomes available.

Mitigation Recommendations

1. Monitor for official patches or updates from Cool Plugins and apply them immediately once available to remediate the vulnerability. 2. In the absence of a patch, implement manual code review and hardening by validating and sanitizing all user inputs controlling file inclusion paths, ensuring only intended files can be included. 3. Restrict PHP include paths using configuration directives (e.g., open_basedir) to limit accessible directories and prevent arbitrary file inclusion. 4. Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious file inclusion attempts targeting the plugin. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and their configurations. 6. Limit plugin usage to trusted sources and remove unused or unnecessary plugins to reduce attack surface. 7. Backup website data regularly to enable quick recovery in case of compromise. 8. Educate site administrators on the risks of LFI vulnerabilities and the importance of timely updates and secure coding practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-22T13:51:57.971Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd755ce6bfc5ba1df04773

Added to database: 4/1/2026, 7:43:24 PM

Last enriched: 4/2/2026, 7:43:45 AM

Last updated: 4/4/2026, 8:21:46 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses