Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56286: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in webcodingplace Classic Addons – WPBakery Page Builder

0
Unknown
VulnerabilityCVE-2024-56286cvecve-2024-56286
Published: Tue Jan 07 2025 (01/07/2025, 10:49:17 UTC)
Source: CVE Database V5
Vendor/Project: webcodingplace
Product: Classic Addons – WPBakery Page Builder

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in webcodingplace Classic Addons – WPBakery Page Builder classic-addons-wpbakery-page-builder-addons allows PHP Local File Inclusion.This issue affects Classic Addons – WPBakery Page Builder: from n/a through <= 3.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 09:59:02 UTC

Technical Analysis

CVE-2024-56286 is a path traversal vulnerability found in the Classic Addons – WPBakery Page Builder plugin developed by webcodingplace. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to traverse directories outside the intended restricted directory. This flaw enables PHP Local File Inclusion (LFI), where an attacker can include and execute arbitrary local files on the web server. The vulnerability affects all versions up to and including 3.0 of the plugin. By exploiting this issue, an attacker can potentially read sensitive files such as configuration files, password files, or other critical data stored on the server. In some cases, if the included files contain executable PHP code or if the attacker can upload malicious files, this could lead to remote code execution. The vulnerability does not currently have a CVSS score and no public exploits have been reported in the wild. However, the ease of exploitation—requiring only manipulation of input parameters without authentication or user interaction—makes it a significant risk. The affected product is a widely used WordPress page builder addon, which is commonly deployed in many websites globally. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability is categorized under path traversal and local file inclusion, both of which are critical web application security issues. Proper input validation and restricting file access paths are essential to prevent exploitation.

Potential Impact

The impact of CVE-2024-56286 can be severe for organizations using the Classic Addons – WPBakery Page Builder plugin. Successful exploitation could lead to unauthorized disclosure of sensitive information such as database credentials, configuration files, or user data, compromising confidentiality. In some scenarios, it could allow attackers to execute arbitrary code on the server, leading to full system compromise, affecting integrity and availability. This could result in website defacement, data theft, or use of the compromised server as a pivot point for further attacks. Organizations relying on WordPress for their web presence, especially those using this plugin, face increased risk of targeted attacks. The vulnerability could also be leveraged to bypass security controls and escalate privileges within the web application environment. Given the widespread use of WordPress and its plugins, the potential attack surface is large, affecting small businesses to large enterprises. The absence of known exploits currently provides a window for remediation, but the risk remains high due to the nature of the vulnerability and the ease of exploitation.

Mitigation Recommendations

To mitigate CVE-2024-56286, organizations should prioritize updating the Classic Addons – WPBakery Page Builder plugin to a patched version once available. Until a patch is released, implement strict input validation on all parameters that handle file paths to ensure they do not contain directory traversal sequences such as '../'. Employ web application firewalls (WAFs) with rules specifically designed to detect and block path traversal attempts. Restrict file permissions on the server to limit access to sensitive files and directories, ensuring the web server user has the minimum necessary privileges. Disable PHP functions that are not required and could be abused for file inclusion or code execution, such as include(), require(), and eval(), if possible. Monitor web server logs for suspicious requests attempting to access unusual file paths. Conduct regular security audits and penetration testing focused on file inclusion vulnerabilities. Additionally, consider isolating the web application environment using containerization or sandboxing to limit the impact of a potential compromise. Educate developers and administrators about secure coding practices related to file handling and path validation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-12-18T19:04:54.438Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75cfe6bfc5ba1df07d4b

Added to database: 4/1/2026, 7:45:19 PM

Last enriched: 4/2/2026, 9:59:02 AM

Last updated: 4/6/2026, 1:10:46 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses