CVE-2024-10763
Published: 13 February 2025
Description
The Campress theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.35 via the 'campress_woocommerce_get_ajax_products' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
Security Summary
CVE-2024-10763 is a Local File Inclusion (LFI) vulnerability, classified under CWE-22, affecting the Campress theme for WordPress in all versions up to and including 1.35. The flaw resides in the 'campress_woocommerce_get_ajax_products' function, which enables unauthenticated attackers to include and execute arbitrary files on the server. This leads to the execution of PHP code within those files, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to high confidentiality, integrity, and availability impacts.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. Successful exploitation allows inclusion of arbitrary server files, enabling PHP code execution to bypass access controls, exfiltrate sensitive data, or achieve remote code execution (RCE) particularly if PHP file uploads are possible on the target system.
Advisories and references, including Wordfence threat intelligence and the theme's ThemeForest page, provide further details on the vulnerability. Security practitioners should review these sources for patch information and mitigation guidance specific to the Campress theme.
Details
- CWE(s)