CVE-2024-13725
Published: 18 February 2025
Description
The Keap Official Opt-in Forms plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.1 via the service parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If register_argc_argv is enabled on the server and pearcmd.php is installed, this issue might lead to Remote Code Execution.
Security Summary
CVE-2024-13725 is a Local File Inclusion (LFI) vulnerability, classified under CWE-22, affecting the Keap Official Opt-in Forms plugin for WordPress in all versions up to and including 2.0.1. The flaw resides in the handling of the "service" parameter within the plugin's infusionsoft.php file, enabling attackers to include arbitrary PHP files from the server. This vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and lack of prerequisites.
Unauthenticated attackers can exploit this vulnerability remotely by manipulating the service parameter to include and execute PHP files on the server. Potential impacts include bypassing access controls, extracting sensitive data, and achieving arbitrary code execution, particularly if PHP file uploads are possible elsewhere on the site. In specific server configurations where register_argc_argv is enabled and pearcmd.php is present, exploitation could escalate to full Remote Code Execution (RCE).
Mitigation is addressed through a patch in WordPress plugin changeset 3243545, available via updates on the official plugin page at wordpress.org/plugins/infusionsoft-official-opt-in-forms. Security advisories, such as Wordfence's threat intelligence report, detail the issue and recommend immediate updates, while the plugin's source code at line 2540 in infusionsoft.php illustrates the vulnerable code path.
Details
- CWE(s)