CVE-2024-9193: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in creativeon WHMpress - WHMCS WordPress Integration Plugin
CVE-2024-9193 is a critical Local File Inclusion (LFI) vulnerability in the WHMpress - WHMCS WordPress Integration Plugin affecting all versions up to 6. 3-revision-0. It allows unauthenticated attackers to include and execute arbitrary files on the server via the whmpress_domain_search_ajax_extended_results() function. Exploitation can lead to execution of arbitrary PHP code, bypassing access controls, and obtaining sensitive data. Attackers can also manipulate WordPress options to change the default user role to administrator and enable user registration, granting themselves administrative access. The vulnerability requires no authentication or user interaction and has a CVSS score of 9. 8, indicating critical severity. No known public exploits have been reported yet. Organizations using this plugin should prioritize patching or mitigation to prevent full site compromise.
AI Analysis
Technical Summary
CVE-2024-9193 is a critical vulnerability classified under CWE-98 (Improper Control of Filename for Include/Require Statement) found in the WHMpress - WHMCS WordPress Integration Plugin. This plugin integrates WHMCS billing and client management with WordPress. The vulnerability exists in the whmpress_domain_search_ajax_extended_results() function, which improperly handles user input used in file inclusion operations. This flaw allows unauthenticated attackers to perform Local File Inclusion (LFI), enabling them to include arbitrary files from the server. Because PHP code in these files can be executed, attackers can run arbitrary PHP commands, leading to full remote code execution. Additionally, attackers can exploit the /admin/services.php endpoint to modify WordPress options, such as changing the default user role to administrator and enabling user registration. This results in attackers creating administrative accounts without authorization. The vulnerability affects all versions up to and including 6.3-revision-0 of the plugin. The CVSS 3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the critical nature and ease of exploitation make this a high-risk threat for WordPress sites using this plugin.
Potential Impact
The impact of CVE-2024-9193 is severe for organizations running WordPress sites with the WHMpress plugin. Successful exploitation allows attackers to execute arbitrary PHP code remotely without authentication, leading to full server compromise. Attackers can bypass access controls, steal sensitive data, and manipulate site configurations. By changing the default user role to administrator and enabling user registration, attackers can create privileged accounts, maintaining persistent control over the site. This can result in data breaches, defacement, malware distribution, and use of the compromised server as a pivot point for further attacks within an organization's network. The vulnerability threatens the confidentiality, integrity, and availability of affected systems and can severely damage organizational reputation and trust.
Mitigation Recommendations
1. Immediate upgrade or patching: Monitor the plugin vendor for an official security update addressing CVE-2024-9193 and apply it promptly. 2. If patching is not immediately possible, disable or remove the WHMpress plugin to eliminate the attack surface. 3. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit LFI via the vulnerable function, focusing on suspicious file inclusion patterns and unauthorized access to /admin/services.php. 4. Restrict file upload capabilities and validate file types rigorously to prevent uploading malicious PHP files disguised as safe types. 5. Harden WordPress configurations by disabling user registration if not required and enforcing least privilege principles on user roles. 6. Monitor logs for unusual access patterns, especially related to the vulnerable endpoints and changes in user roles or registrations. 7. Conduct regular security audits and vulnerability scans to detect exploitation attempts early. 8. Employ intrusion detection/prevention systems to alert on or block suspicious activity targeting the plugin.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-9193: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in creativeon WHMpress - WHMCS WordPress Integration Plugin
Description
CVE-2024-9193 is a critical Local File Inclusion (LFI) vulnerability in the WHMpress - WHMCS WordPress Integration Plugin affecting all versions up to 6. 3-revision-0. It allows unauthenticated attackers to include and execute arbitrary files on the server via the whmpress_domain_search_ajax_extended_results() function. Exploitation can lead to execution of arbitrary PHP code, bypassing access controls, and obtaining sensitive data. Attackers can also manipulate WordPress options to change the default user role to administrator and enable user registration, granting themselves administrative access. The vulnerability requires no authentication or user interaction and has a CVSS score of 9. 8, indicating critical severity. No known public exploits have been reported yet. Organizations using this plugin should prioritize patching or mitigation to prevent full site compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-9193 is a critical vulnerability classified under CWE-98 (Improper Control of Filename for Include/Require Statement) found in the WHMpress - WHMCS WordPress Integration Plugin. This plugin integrates WHMCS billing and client management with WordPress. The vulnerability exists in the whmpress_domain_search_ajax_extended_results() function, which improperly handles user input used in file inclusion operations. This flaw allows unauthenticated attackers to perform Local File Inclusion (LFI), enabling them to include arbitrary files from the server. Because PHP code in these files can be executed, attackers can run arbitrary PHP commands, leading to full remote code execution. Additionally, attackers can exploit the /admin/services.php endpoint to modify WordPress options, such as changing the default user role to administrator and enabling user registration. This results in attackers creating administrative accounts without authorization. The vulnerability affects all versions up to and including 6.3-revision-0 of the plugin. The CVSS 3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the critical nature and ease of exploitation make this a high-risk threat for WordPress sites using this plugin.
Potential Impact
The impact of CVE-2024-9193 is severe for organizations running WordPress sites with the WHMpress plugin. Successful exploitation allows attackers to execute arbitrary PHP code remotely without authentication, leading to full server compromise. Attackers can bypass access controls, steal sensitive data, and manipulate site configurations. By changing the default user role to administrator and enabling user registration, attackers can create privileged accounts, maintaining persistent control over the site. This can result in data breaches, defacement, malware distribution, and use of the compromised server as a pivot point for further attacks within an organization's network. The vulnerability threatens the confidentiality, integrity, and availability of affected systems and can severely damage organizational reputation and trust.
Mitigation Recommendations
1. Immediate upgrade or patching: Monitor the plugin vendor for an official security update addressing CVE-2024-9193 and apply it promptly. 2. If patching is not immediately possible, disable or remove the WHMpress plugin to eliminate the attack surface. 3. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit LFI via the vulnerable function, focusing on suspicious file inclusion patterns and unauthorized access to /admin/services.php. 4. Restrict file upload capabilities and validate file types rigorously to prevent uploading malicious PHP files disguised as safe types. 5. Harden WordPress configurations by disabling user registration if not required and enforcing least privilege principles on user roles. 6. Monitor logs for unusual access patterns, especially related to the vulnerable endpoints and changes in user roles or registrations. 7. Conduct regular security audits and vulnerability scans to detect exploitation attempts early. 8. Employ intrusion detection/prevention systems to alert on or block suspicious activity targeting the plugin.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-09-25T21:06:08.977Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b43b7ef31ef0b550985
Added to database: 2/25/2026, 9:36:03 PM
Last enriched: 2/25/2026, 11:06:15 PM
Last updated: 2/26/2026, 6:54:10 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.