CVE-2024-13409

7.5 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to perform Local File Inclusion attacks via the 'theme' parameter in the Post Grid, Slider & Carousel Ultimate plugin. Attackers can include and execute arbitrary PHP files on the server, potentially leading to remote code execution, data theft, or privilege escalation. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget
Versions: All versions up to and including 1.6.10
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least Contributor role. WordPress multisite installations are also vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution, allowing attackers to install backdoors, steal sensitive data, deface websites, or pivot to other systems.

🟠

Likely Case

Unauthorized file access leading to sensitive information disclosure, privilege escalation to administrator, or website defacement.

🟢

If Mitigated

Limited impact if proper file permissions restrict PHP execution in upload directories and strict access controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of file paths. Attackers may need to upload malicious files first if targeting file inclusion.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/ajax.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Post Grid, Slider & Carousel Ultimate'. 4. Click 'Update Now' if available, or download version 1.7+ from WordPress repository. 5. Replace plugin files with patched version.

🔧 Temporary Workarounds

Restrict User Roles

all

Temporarily remove Contributor and Author roles from untrusted users until patching is complete.

Disable Plugin

all

Deactivate the vulnerable plugin if functionality is not critical.

🧯 If You Can't Patch

  • Implement strict file upload restrictions to prevent PHP file uploads
  • Apply web application firewall rules to block requests containing local file inclusion patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Post Grid, Slider & Carousel Ultimate' version 1.6.10 or lower.

Check Version:

wp plugin list --name='post-grid-carousel-ultimate' --field=version

Verify Fix Applied:

Confirm plugin version is 1.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'action=post_type_ajax_handler' and 'theme' parameter containing file paths
  • Unusual file inclusion attempts in web server logs

Network Indicators:

  • HTTP requests with suspicious 'theme' parameter values attempting directory traversal

SIEM Query:

web.url:*admin-ajax.php* AND web.query:action=post_type_ajax_handler AND (web.query:theme=*../* OR web.query:theme=*php*)

🔗 References

📤 Share & Export