CVE-2024-13545

9.8 CRITICAL

📋 TL;DR

The Bootstrap Ultimate WordPress theme contains a Local File Inclusion vulnerability that allows unauthenticated attackers to include arbitrary PHP files from the server. This can lead to remote code execution, particularly when php://filter wrappers are enabled. All WordPress sites using Bootstrap Ultimate theme versions up to 1.4.9 are affected.

💻 Affected Systems

Products:
  • Bootstrap Ultimate WordPress Theme
Versions: All versions up to and including 1.4.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Bootstrap Ultimate theme active. php://filter wrapper availability increases severity.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated attackers achieve remote code execution by including malicious PHP files or using php://filter wrappers to execute arbitrary code.

🟢

If Mitigated

Attackers can still read sensitive files but code execution is prevented if PHP file uploads are restricted and php://filter is disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple path parameter manipulation required. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.0 or later

Vendor Advisory: https://themes.trac.wordpress.org/browser/bootstrap-ultimate/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Update Bootstrap Ultimate theme to version 1.5.0 or later. 4. Alternatively, replace with a different theme.

🔧 Temporary Workarounds

Disable php://filter wrapper

all

Prevent PHP filter wrappers from being used in file inclusion attacks

Edit php.ini: allow_url_fopen = Off
Edit php.ini: allow_url_include = Off

Restrict file uploads

linux

Prevent PHP file uploads to limit available files for inclusion

Edit .htaccess: <FilesMatch "\.php$"> Deny from all </FilesMatch>

🧯 If You Can't Patch

  • Deactivate and remove Bootstrap Ultimate theme immediately
  • Implement web application firewall rules to block requests containing path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in wp-content/themes/bootstrap-ultimate/style.css or WordPress admin panel

Check Version:

grep 'Version:' wp-content/themes/bootstrap-ultimate/style.css

Verify Fix Applied:

Confirm theme version is 1.5.0 or later in WordPress admin Appearance > Themes

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with path parameter containing ../ patterns
  • Requests to theme files with unusual parameter values
  • PHP error logs showing file inclusion failures

Network Indicators:

  • Unusual requests to theme PHP files with path parameters
  • Traffic patterns suggesting file inclusion attempts

SIEM Query:

source="web_logs" AND (uri="*path=*" AND uri="*../*") AND user_agent!="*bot*"

🔗 References

📤 Share & Export