CVE-2024-8252: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in hornero Clean Login
CVE-2024-8252 is a high-severity Local File Inclusion (LFI) vulnerability in the Clean Login WordPress plugin (versions up to 1. 14. 5). It allows authenticated users with Contributor-level access or higher to exploit the 'template' attribute in the clean-login-register shortcode to include and execute arbitrary files on the server. This can lead to remote code execution by uploading and including malicious PHP code disguised as safe file types. The vulnerability enables attackers to bypass access controls, access sensitive data, and execute arbitrary code without user interaction. Exploitation requires network access and low privileges but no user interaction. No known exploits are reported in the wild yet, but the vulnerability poses a significant risk to WordPress sites using this plugin. Immediate patching or mitigation is recommended to prevent potential compromise.
AI Analysis
Technical Summary
CVE-2024-8252 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Clean Login plugin for WordPress developed by hornero. The flaw exists in all versions up to and including 1.14.5 and arises from improper control of the filename used in the include/require statement within the 'template' attribute of the clean-login-register shortcode. Authenticated attackers with Contributor-level permissions or higher can exploit this vulnerability by manipulating the 'template' parameter to include arbitrary files from the server. This inclusion allows execution of any PHP code contained within those files, effectively enabling remote code execution. The vulnerability is particularly dangerous because it can be exploited by users with relatively low privileges and does not require additional user interaction. Attackers can upload files disguised as images or other safe file types and then include these files via the vulnerable parameter to execute malicious code. This can lead to bypassing access controls, data exfiltration, and full system compromise. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability with network attack vector, low attack complexity, and privileges required but no user interaction. Although no known exploits have been reported in the wild, the vulnerability's nature and ease of exploitation make it a critical risk for affected WordPress sites.
Potential Impact
The impact of CVE-2024-8252 is severe for organizations using the affected Clean Login plugin on WordPress sites. Exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the server. This can result in complete compromise of the web server, including unauthorized access to sensitive data, modification or deletion of content, installation of backdoors or malware, and lateral movement within the network. Since the vulnerability can be exploited by users with Contributor-level access, it lowers the barrier for attackers who may have gained limited access through other means such as phishing or weak credentials. The ability to bypass access controls and execute code without user interaction increases the risk of automated or stealthy attacks. Organizations relying on WordPress for critical business functions, e-commerce, or customer data management are particularly at risk. The widespread use of WordPress globally means that many organizations could be affected, potentially leading to data breaches, service disruptions, reputational damage, and regulatory consequences.
Mitigation Recommendations
To mitigate CVE-2024-8252, organizations should immediately update the Clean Login plugin to a patched version once available from the vendor. Until a patch is released, administrators should consider disabling or removing the Clean Login plugin to eliminate the attack surface. Restrict Contributor-level and higher permissions to trusted users only, and audit existing user roles to minimize unnecessary privileges. Implement Web Application Firewall (WAF) rules to detect and block attempts to manipulate the 'template' parameter or suspicious file inclusion patterns. Monitor server logs for unusual file access or inclusion attempts related to the plugin. Enforce strict file upload validation and sanitization to prevent uploading of malicious PHP code disguised as safe file types. Employ security plugins that can detect and quarantine malicious files on WordPress installations. Regularly back up website data and configurations to enable recovery in case of compromise. Finally, conduct security awareness training for users with elevated privileges to reduce the risk of credential compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-8252: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in hornero Clean Login
Description
CVE-2024-8252 is a high-severity Local File Inclusion (LFI) vulnerability in the Clean Login WordPress plugin (versions up to 1. 14. 5). It allows authenticated users with Contributor-level access or higher to exploit the 'template' attribute in the clean-login-register shortcode to include and execute arbitrary files on the server. This can lead to remote code execution by uploading and including malicious PHP code disguised as safe file types. The vulnerability enables attackers to bypass access controls, access sensitive data, and execute arbitrary code without user interaction. Exploitation requires network access and low privileges but no user interaction. No known exploits are reported in the wild yet, but the vulnerability poses a significant risk to WordPress sites using this plugin. Immediate patching or mitigation is recommended to prevent potential compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-8252 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Clean Login plugin for WordPress developed by hornero. The flaw exists in all versions up to and including 1.14.5 and arises from improper control of the filename used in the include/require statement within the 'template' attribute of the clean-login-register shortcode. Authenticated attackers with Contributor-level permissions or higher can exploit this vulnerability by manipulating the 'template' parameter to include arbitrary files from the server. This inclusion allows execution of any PHP code contained within those files, effectively enabling remote code execution. The vulnerability is particularly dangerous because it can be exploited by users with relatively low privileges and does not require additional user interaction. Attackers can upload files disguised as images or other safe file types and then include these files via the vulnerable parameter to execute malicious code. This can lead to bypassing access controls, data exfiltration, and full system compromise. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability with network attack vector, low attack complexity, and privileges required but no user interaction. Although no known exploits have been reported in the wild, the vulnerability's nature and ease of exploitation make it a critical risk for affected WordPress sites.
Potential Impact
The impact of CVE-2024-8252 is severe for organizations using the affected Clean Login plugin on WordPress sites. Exploitation can lead to remote code execution, allowing attackers to execute arbitrary PHP code on the server. This can result in complete compromise of the web server, including unauthorized access to sensitive data, modification or deletion of content, installation of backdoors or malware, and lateral movement within the network. Since the vulnerability can be exploited by users with Contributor-level access, it lowers the barrier for attackers who may have gained limited access through other means such as phishing or weak credentials. The ability to bypass access controls and execute code without user interaction increases the risk of automated or stealthy attacks. Organizations relying on WordPress for critical business functions, e-commerce, or customer data management are particularly at risk. The widespread use of WordPress globally means that many organizations could be affected, potentially leading to data breaches, service disruptions, reputational damage, and regulatory consequences.
Mitigation Recommendations
To mitigate CVE-2024-8252, organizations should immediately update the Clean Login plugin to a patched version once available from the vendor. Until a patch is released, administrators should consider disabling or removing the Clean Login plugin to eliminate the attack surface. Restrict Contributor-level and higher permissions to trusted users only, and audit existing user roles to minimize unnecessary privileges. Implement Web Application Firewall (WAF) rules to detect and block attempts to manipulate the 'template' parameter or suspicious file inclusion patterns. Monitor server logs for unusual file access or inclusion attempts related to the plugin. Enforce strict file upload validation and sanitization to prevent uploading of malicious PHP code disguised as safe file types. Employ security plugins that can detect and quarantine malicious files on WordPress installations. Regularly back up website data and configurations to enable recovery in case of compromise. Finally, conduct security awareness training for users with elevated privileges to reduce the risk of credential compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-28T00:08:10.437Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c24b7ef31ef0b560673
Added to database: 2/25/2026, 9:39:48 PM
Last enriched: 2/26/2026, 3:54:19 AM
Last updated: 2/26/2026, 6:16:59 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.