The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.9 via the path parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If php://filter is enabled on the server, this issue may directly lead to Remote Code Execution.
References
Configurations
Configuration 1 (hide)
|
History
05 Feb 2025, 17:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:* | |
Summary |
|
|
References | () https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/ae07af10-e5fc-4f28-a343-f56c0e2bc324?source=cve - Third Party Advisory | |
First Time |
G5plus ultimate Bootstrap Elements For Elementor
G5plus |
|
CWE | NVD-CWE-Other |
24 Jan 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-24 09:15
Updated : 2025-02-05 17:12
NVD link : CVE-2024-13545
Mitre link : CVE-2024-13545
CVE.ORG link : CVE-2024-13545
JSON object : View
Products Affected
g5plus
- ultimate_bootstrap_elements_for_elementor
CWE