Cyber Posture

CVE-2024-13617

HighPublic PoC

Published: 25 March 2025

Published
25 March 2025
Modified
20 June 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0020 41.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2024-13617 is a vulnerability in the aoa-downloadable WordPress plugin through version 0.1.0. The issue stems from the plugin's download function failing to validate a parameter, which allows unauthenticated attackers to download arbitrary files from the server.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity, requiring no privileges or user interaction. Exploitation results in high confidentiality impact by enabling access to sensitive server files, reflected in the CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), due to the changed scope.

Mitigation details are available in the WPScan advisory at https://wpscan.com/vulnerability/8d6dd979-21ef-4d14-9c42-bbd1d7b65c53/.

Details

CWE(s)
NVD-CWE-noinfo

Affected Products

osteopathic
downloadable by american osteopathic association
≤ 0.1.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Vulnerability in public-facing WordPress plugin enables remote unauthenticated arbitrary file download, directly facilitating T1190 (exploitation of public-facing app for initial access) and T1005 (collection of data from local system files).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References