CVE-2024-54291
Published: 28 March 2025
Description
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Security Summary
CVE-2024-54291 is an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability, classified as CWE-22, in the labs64 PluginPass WordPress plugin (pluginpass-pro-plugintheme-licensing). It enables manipulation of web input to file system calls and affects all versions from n/a through 0.9.10.
Remote attackers can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). The issue results in a scope change (S:C) with high availability impact (A:H) and a CVSS v3.1 base score of 8.6, allowing arbitrary file download and deletion capabilities.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/pluginpass-pro-plugintheme-licensing/vulnerability/wordpress-pluginpass-plugin-0-9-10-arbitrary-file-download-delete-vulnerability?_s_id=cve documents this as an arbitrary file download/delete vulnerability in WordPress PluginPass plugin version 0.9.10. Security practitioners should consult the advisory for detailed mitigation and patching guidance.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Path traversal in public-facing WordPress plugin enables remote exploitation (T1190) with arbitrary file download (T1005) and deletion (T1070.004, T1485).