Cyber Posture

CVE-2024-13545

Critical

Published: 24 January 2025

Published
24 January 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0185 83.1th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.9 via the path parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If php://filter is enabled on the server, this issue may directly lead to Remote Code Execution.

Security Summary

CVE-2024-13545 is a Local File Inclusion (LFI) vulnerability affecting the Bootstrap Ultimate theme for WordPress in all versions up to and including 1.4.9. The flaw exists via the path parameter, which allows unauthenticated attackers to include arbitrary PHP files on the server, leading to the execution of PHP code within those files. Associated with CWE-22, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for high confidentiality, integrity, and availability impacts.

Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By manipulating the path parameter, they can include and execute PHP files, enabling bypass of access controls, theft of sensitive data, or code execution—particularly if PHP file uploads are possible elsewhere on the site. If the server has php://filter enabled, exploitation may directly result in Remote Code Execution (RCE).

Advisories and technical details are available from sources including the Wordfence threat intelligence page (https://www.wordfence.com/threat-intel/vulnerabilities/id/ae07af10-e5fc-4f28-a343-f56c0e2bc324?source=cve) and the vulnerable code location in the theme's documentation (https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8). Security practitioners should consult these for specific mitigation guidance, such as updating the theme beyond version 1.4.9 if patches are available.

Details

CWE(s)
CWE-22NVD-CWE-Other

Affected Products

g5plus
ultimate bootstrap elements for elementor
≤ 1.4.9

References