CVE-2024-13408

7.5 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to include and execute arbitrary PHP files on the server via the 'theme' attribute in the pgcu shortcode. This can lead to remote code execution, data theft, and privilege escalation. All WordPress sites using Post Grid, Slider & Carousel Ultimate plugin versions up to 1.6.10 are affected.

💻 Affected Systems

Products:
  • Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget
Versions: All versions up to and including 1.6.10
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least Contributor role; affects all WordPress installations using vulnerable plugin versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data exfiltration, ransomware deployment, or complete site takeover via arbitrary PHP code execution.

🟠

Likely Case

Unauthorized file access, privilege escalation to administrator, and installation of backdoors or malware on the WordPress site.

🟢

If Mitigated

Limited impact if proper file upload restrictions and server hardening are in place, but still potential for data leakage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires Contributor-level access; attackers may need to upload PHP files first or leverage existing files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/shortcode.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Post Grid, Slider & Carousel Ultimate'. 4. Click 'Update Now' if available, or manually update to version 1.7+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Restrict User Roles

all

Temporarily remove Contributor and higher roles from untrusted users until patching.

Disable Plugin

all

Deactivate the vulnerable plugin if functionality is not critical.

🧯 If You Can't Patch

  • Implement strict file upload controls to prevent PHP file uploads via media library or other plugins.
  • Apply web application firewall (WAF) rules to block requests containing local file inclusion patterns in pgcu shortcode parameters.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Post Grid, Slider & Carousel Ultimate' version 1.6.10 or lower.

Check Version:

wp plugin list --name='post-grid-carousel-ultimate' --field=version

Verify Fix Applied:

Confirm plugin version is 1.7 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual shortcode usage with 'theme' parameter in POST requests
  • PHP file inclusion attempts in web server logs
  • Increased activity from Contributor-level accounts

Network Indicators:

  • HTTP requests containing pgcu shortcode with file paths in theme attribute

SIEM Query:

source="web_logs" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path="/index.php") AND (query_string="*pgcu*" OR post_data="*theme=*" AND post_data="*.php*")

🔗 References

📤 Share & Export