Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9193: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in creativeon WHMpress - WHMCS WordPress Integration Plugin

0
Critical
VulnerabilityCVE-2024-9193cvecve-2024-9193cwe-98
Published: Fri Feb 28 2025 (02/28/2025, 08:23:16 UTC)
Source: CVE Database V5
Vendor/Project: creativeon
Product: WHMpress - WHMCS WordPress Integration Plugin

Description

CVE-2024-9193 is a critical Local File Inclusion (LFI) vulnerability in the WHMpress - WHMCS WordPress Integration Plugin affecting all versions up to 6. 3-revision-0. It allows unauthenticated attackers to include and execute arbitrary files on the server via the whmpress_domain_search_ajax_extended_results() function. Exploitation can lead to execution of arbitrary PHP code, bypassing access controls, and obtaining sensitive data. Attackers can also manipulate WordPress options to change the default user role to administrator and enable user registration, granting themselves administrative access. The vulnerability requires no authentication or user interaction and has a CVSS score of 9. 8, indicating critical severity. No known public exploits have been reported yet. Organizations using this plugin should prioritize patching or mitigation to prevent full site compromise.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:06:15 UTC

Technical Analysis

CVE-2024-9193 is a critical vulnerability classified under CWE-98 (Improper Control of Filename for Include/Require Statement) found in the WHMpress - WHMCS WordPress Integration Plugin. This plugin integrates WHMCS billing and client management with WordPress. The vulnerability exists in the whmpress_domain_search_ajax_extended_results() function, which improperly handles user input used in file inclusion operations. This flaw allows unauthenticated attackers to perform Local File Inclusion (LFI), enabling them to include arbitrary files from the server. Because PHP code in these files can be executed, attackers can run arbitrary PHP commands, leading to full remote code execution. Additionally, attackers can exploit the /admin/services.php endpoint to modify WordPress options, such as changing the default user role to administrator and enabling user registration. This results in attackers creating administrative accounts without authorization. The vulnerability affects all versions up to and including 6.3-revision-0 of the plugin. The CVSS 3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the critical nature and ease of exploitation make this a high-risk threat for WordPress sites using this plugin.

Potential Impact

The impact of CVE-2024-9193 is severe for organizations running WordPress sites with the WHMpress plugin. Successful exploitation allows attackers to execute arbitrary PHP code remotely without authentication, leading to full server compromise. Attackers can bypass access controls, steal sensitive data, and manipulate site configurations. By changing the default user role to administrator and enabling user registration, attackers can create privileged accounts, maintaining persistent control over the site. This can result in data breaches, defacement, malware distribution, and use of the compromised server as a pivot point for further attacks within an organization's network. The vulnerability threatens the confidentiality, integrity, and availability of affected systems and can severely damage organizational reputation and trust.

Mitigation Recommendations

1. Immediate upgrade or patching: Monitor the plugin vendor for an official security update addressing CVE-2024-9193 and apply it promptly. 2. If patching is not immediately possible, disable or remove the WHMpress plugin to eliminate the attack surface. 3. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit LFI via the vulnerable function, focusing on suspicious file inclusion patterns and unauthorized access to /admin/services.php. 4. Restrict file upload capabilities and validate file types rigorously to prevent uploading malicious PHP files disguised as safe types. 5. Harden WordPress configurations by disabling user registration if not required and enforcing least privilege principles on user roles. 6. Monitor logs for unusual access patterns, especially related to the vulnerable endpoints and changes in user roles or registrations. 7. Conduct regular security audits and vulnerability scans to detect exploitation attempts early. 8. Employ intrusion detection/prevention systems to alert on or block suspicious activity targeting the plugin.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-25T21:06:08.977Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b43b7ef31ef0b550985

Added to database: 2/25/2026, 9:36:03 PM

Last enriched: 2/25/2026, 11:06:15 PM

Last updated: 2/26/2026, 6:54:10 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats