CVE-2024-12040

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with Contributor-level WordPress access or higher to perform Local File Inclusion via the 'theme' attribute in the wcpcsu shortcode. Attackers can include and execute arbitrary PHP files on the server, potentially leading to remote code execution, data theft, or privilege escalation. All WordPress sites using the vulnerable Product Carousel Slider & Grid Ultimate for WooCommerce plugin are affected.

💻 Affected Systems

Products:
  • Product Carousel Slider & Grid Ultimate for WooCommerce WordPress plugin
Versions: All versions up to and including 1.9.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Contributor-level WordPress user access or higher. The plugin must be active and the wcpcsu shortcode must be usable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution leading to data exfiltration, backdoor installation, or complete site takeover.

🟠

Likely Case

Unauthorized file access, privilege escalation to administrator, or installation of web shells for persistent access.

🟢

If Mitigated

Limited impact if file uploads are restricted and proper file permissions prevent PHP execution in upload directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.10.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3203986/woo-product-carousel-slider-and-grid-ultimate/tags/1.10.0/includes/classes/class-shortcode.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Product Carousel Slider & Grid Ultimate for WooCommerce'. 4. Click 'Update Now' if available, or manually update to version 1.10.0. 5. Verify the plugin is active and functioning correctly.

🔧 Temporary Workarounds

Remove vulnerable shortcode usage

all

Temporarily disable or remove any posts/pages using the wcpcsu shortcode with the theme attribute until patched.

Restrict file uploads

linux

Configure server to prevent PHP execution in upload directories and restrict file types that can be uploaded.

# Add to .htaccess in uploads directory:
<Files *.php>
    deny from all
</Files>

🧯 If You Can't Patch

  • Immediately revoke Contributor-level access from untrusted users and audit user roles.
  • Implement web application firewall (WAF) rules to block requests containing local file inclusion patterns in the theme parameter.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Product Carousel Slider & Grid Ultimate for WooCommerce' version 1.9.10 or lower.

Check Version:

# In WordPress, check via:
wp plugin list --name="Product Carousel Slider & Grid Ultimate for WooCommerce" --field=version

Verify Fix Applied:

Confirm plugin version is 1.10.0 or higher in WordPress admin panel and test that the wcpcsu shortcode functions without errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress containing 'theme' parameter with file paths
  • PHP error logs showing file inclusion errors or unexpected file access

Network Indicators:

  • HTTP requests with parameters like 'theme=../../../etc/passwd' or similar path traversal patterns

SIEM Query:

source="web_server_logs" AND (uri_path="*wcpcsu*" OR parameters="*theme=*" AND parameters="*../*")

🔗 References

📤 Share & Export