Cyber Posture

CVE-2024-11642

Critical

Published: 09 January 2025

Published
09 January 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0075 73.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The Post Grid Master – Custom Post Types, Taxonomies & Ajax Filter Everything with Infinite Scroll, Load More, Pagination & Shortcode Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.4.12 via the 'locate_template' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The file included must have a .php extension.

Security Summary

CVE-2024-11642 is a local file inclusion (LFI) vulnerability, classified under CWE-22 (path traversal), affecting the Post Grid Master – Custom Post Types, Taxonomies & Ajax Filter Everything with Infinite Scroll, Load More, Pagination & Shortcode Builder plugin for WordPress. The flaw exists in all versions up to and including 3.4.12 due to improper handling in the 'locate_template' function within Shortcode.php. This allows attackers to include and execute arbitrary files on the server, provided they have a .php extension, potentially leading to remote code execution.

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation enables the inclusion of arbitrary PHP files, allowing code execution, bypass of access controls, and extraction of sensitive data. The impact is heightened in environments where users can upload images or other "safe" file types that contain embedded PHP code.

Advisories, including those from Wordfence, highlight the vulnerability and point to code changes in version 3.4.13 of the plugin, visible in the WordPress plugin trac repository, as the fix. Security practitioners should urge immediate updates to version 3.4.13 or later for affected WordPress sites running the plugin to mitigate the risk of exploitation.

Details

CWE(s)
CWE-22

Affected Products

addonmaster
post grid master
≤ 3.4.12

References