- Description
- The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.9 via the path parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If php://filter is enabled on the server, this issue may directly lead to Remote Code Execution.
- Source
- security@wordfence.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-22
- nvd@nist.gov
- NVD-CWE-Other
- Hype score
- Not currently trending
[CVE-2024-13545: CRITICAL] Alert: WordPress Bootstrap Ultimate theme up to v1.4.9 vulnerable to Local File Inclusion via path parameter, allowing attackers to execute PHP code and potentially achieve Remote Code ...#cybersecurity,#vulnerability https://t.co/3X2o00w23J https://t.c
@CveFindCom
24 Jan 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-13545 The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.9 via the path parameter. This makes it pos… https://t.co/xacQQ5CZYw
@CVEnew
24 Jan 2025
438 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "44F880CF-AAC6-470A-B9B4-DCE7C4035F76",
"versionEndIncluding": "1.4.9"
}
],
"operator": "OR"
}
]
}
]